this post was submitted on 21 May 2024
358 points (96.4% liked)

Technology

59381 readers
2690 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 4 points 5 months ago* (last edited 5 months ago) (1 children)

That's not how it should work. A wipe should do a secure wipe either by writing random data to every bit or by doing a flash erase

It isn't practical to do that on a per file basis but when the device changes ownership it is necessary

[–] [email protected] 2 points 5 months ago

Yes, it should, but is mostly not done. But better approach is to use an encrypted filesystem like iOS and macOS(only with fileVault enabled) does. You can not recover encrypted data.

What happened here did not happen to phones that got wiped but only to phones where one logged logged off iCloud and logged into new iCloud account. Still the same encryption keys for filesystem.

There is no proof that it ever happened to a phone that was wiped completely.

Performing secure wipes reduces the lifetime of the storage device, if you sell a PC with removable storage device, it is better to just replace it with a new one for selling, and of course use fileVault on mac, bitlocker on windows and LUKS on linux (of course on linux there are more ways and LUKS is a partition and not a filesystem)