Data Sanitization Utility
Latest version: 0.3.1

Turn data into unreadable noise.

Smog

Smog saturates files, directories, free space, and entire volumes with repeated overwrite passes, replacing recoverable information with dense entropy until what remains is only digital fog.

Scope Files, trees, free space, full devices
Control Operator-defined iterations and explicit targets
Feedback Terminal progress or optional Zenity dialogs
3 Default Iterations
CLI Primary Interface
Zenity Optional GUI
Rust Built From Source

A LOW-VISIBILITY EVENT FOR SENSITIVE DATA.

Conventional deletion only removes references. smog operates below that layer, repeatedly overwriting what exists on disk so forensic reconstruction becomes impractical.

01

Smother Information

Drive files and folders into high-entropy output instead of merely unlinking their paths.

02

Dissipate Evidence

Target free space and whole devices when deleted remnants and latent traces still matter.

03

Zero Visibility

Replace readable structure with deliberate overwrite passes until the remaining surface is only noise.

04

Controlled Pollution

Choose the target, choose the number of iterations, and watch the process complete in plain sight.

FROM PATH TO PARTICULATE NOISE.

The tool is designed around explicit execution. You point smog at a target, it performs the requested overwrite passes, and it exposes progress so the operator can confirm the destruction finished as intended.

01

Select the target

Run against an individual file, a directory tree, free space, or an entire device depending on the sensitivity of the job.

02

Apply overwrite passes

Each operation performs repeated writes over the underlying data, with 3 iterations by default and custom counts available through -n.

03

Track the operation

Use the normal terminal output, a single aggregated progress bar with SMOG_USE_PROGRESSBAR=1, or Zenity dialogs with SMOG_USE_ZENITY=1.

04

Leave unreadable residue

The goal is not simple removal. The goal is neutralization through entropy-driven overwriting.

Target queue overwrite pass 2/3
/ secret_document.pdf
/ private_photo.jpg
/ old_backup.tar.gz
/ notes.txt
saturation state
entropy rising recovery falling

BUILT TO ERASE MORE THAN POINTERS.

smog keeps the interface simple, but the operational scope is wide enough for daily workstation hygiene and heavier sanitization workflows.

Files

Secure overwrite of individual targets

Run directly against a single file when one artifact needs to disappear without leaving readable remnants behind.

Directories

Recursive sanitization of trees

Point smog at a folder and let the CLI process nested content with the same overwrite methodology.

Free Space

Clean traces of previously deleted data

Wipe free space when standard deletion has already happened but latent sectors are still a concern.

Devices

Full-volume destruction path

Apply the same controlled overwrite process to entire storage devices when the job is broader than a few paths.

Signals

Terminal, Zenity, or one progress bar

SMOG_USE_ZENITY=1 enables dialogs. SMOG_USE_PROGRESSBAR=1 collapses the terminal feedback into one aggregated bar.

Operator Control

Deterministic execution, explicit intent

The tool favors observable behavior, visible progress, and user-selected iteration counts over hidden automation.

DEPLOY THE FOG, KEEP THE COMMAND SIMPLE.

The official install path is a direct shell bootstrap for Linux. Source builds remain available for operators who want a local binary.

Universal Linux Installation
bash <(curl -fsSL https://evolvbits.github.io/smog/installer/linux.sh)
Note: Sudo is necessary.
Arch Linux Installation
yay -S smog-bin

Get the weapons for the HIDDEN!

Get some Smog command options. For a full list of commands, see the Smog documentation or use the --help command flag.

Flag / Argument
Description
Default
[TARGET]
File or folder path to sanitize securely.
Required for target mode
--trash
Empty the trash securely.
off
--confirm
Ask for confirmation before removing.
off
-n, --iterations <N>
Override the default number of overwrite passes.
3
-k, --kill
Safely remove and close the terminal session.
off
-c, --credits
Show project credits.
off
-V, --version
Display the current version.
informational

VERIFY BEFORE YOU EXECUTE.

The documentation provides a signature-verification path for operators who want stronger trust guarantees before running a binary release.

What verification gives you

  • Authenticity that the release came from the maintainers.
  • Integrity that the archive was not modified in transit.
  • Accountability through signed release artifacts.

Reference commands


$ gpg --keyserver keys.openpgp.org --recv-keys E6A5CC75350F3DCE
$ gpg --verify SHA256SUMS.asc
$ sha256sum -c SHA256SUMS

DELETE THE REFERENCE, OR NEUTRALIZE THE DATA.

Standard deletion removes the pointer. The payload can remain on disk until something else overwrites it. Smog exists for the moments when that gap is unacceptable.

01
Filesystem deletion is not destruction References disappear first. Recoverable content can persist underneath.
02
Trash cleanup still leaves history Emptying the trash usually changes visibility, not the physical state of the old bytes.
03
Residual structure has value Even partial remnants can matter when the data is sensitive enough.