── REFERENCE
Tech specs.
The short version: nothing leaves your device without your key, nothing gets kept we don't need to keep, and nothing gets deleted in a way that leaves something behind.
Erasure standard
NIST 800-88 Rev. 1, DoD 5220.22-M
Software-based, multi-pass overwrite with verification.
Overwrite passes
Configurable: 1, 3, 7, or 35 (Gutmann)
Default is 7-pass on SSD, 35-pass on HDD.
Verification
Read-back confirmation + sector hash
Signed certificate issued per erasure job.
Supported storage
NVMe, SATA SSD, HDD, USB, SD, microSD
External drives supported on Windows.
Scheduling
Time, interval, filter-based rules
Filters: file type, name pattern, last-modified age, path.
Remote trigger
Push via device registry
Devices must check in at least once per 24 hours.
Audit logging
Local + optional cloud export
JSON, CEF, or syslog formats.
Signed certificates
Ed25519 + SHA-256
Tamper-evident, verifiable offline.
FOR DEVELOPERS
Integrate LMN8
CLI and REST APIs for Zero and Encrypt. Trigger wipes, verify certificates, and manage vaults from your own tooling.
FOR SECURITY TEAMS
Pen-test reports
Quarterly third-party audits published in full. Architecture whitepapers for Zero and Encrypt available under NDA for enterprise buyers.