Selling or Giving Away Old Devices: 4 Essential Steps

The Hidden Dangers of Discarded Devices
A fascinating hobby involves acquiring used hard drives through online marketplaces and subsequently employing data recovery tools. This process often reveals a surprising amount of residual information. It’s remarkable how frequently individuals neglect to securely erase data before selling or disposing of their devices.
This oversight is akin to publicly advertising sensitive personal details. Leaving items like family pictures, financial records, and identification documents readily accessible poses a significant risk.
To avoid becoming a statistic in the growing number of privacy breaches and identity theft cases, consider the following guidance. These 3 crucial steps should be implemented prior to the disposal of any electronic device.
Step 1: Overwrite the Data
Simply deleting files isn't enough. Data can often be recovered using specialized software. Instead, utilize a data wiping tool that overwrites the existing data with random characters multiple times.
This process makes it significantly more difficult, and often impossible, for anyone to retrieve the original information. Several free and paid options are available for various operating systems.
Step 2: Physical Destruction (For Sensitive Data)
For exceptionally sensitive information, consider physically destroying the storage device. This could involve shredding the hard drive or physically damaging the solid-state drive (SSD).
While more extreme, physical destruction offers the highest level of security. It ensures that no data can be recovered, regardless of technological advancements.
Step 3: Securely Wipe Mobile Devices
Smartphones and tablets require specific wiping procedures. Factory resetting a device is a good start, but it may not be sufficient. Utilize the device’s built-in secure erase function, if available.
Alternatively, specialized mobile device wiping software can be employed. Remember to also remove any SIM cards or memory cards before disposal. Protecting your personal information is paramount.
Data Backup Before Device Transfer
It's common to believe all necessary data has been transferred, however, items like bookmarks or specific application configurations are frequently overlooked.
A comprehensive disk image of the computer being sold or gifted represents the most reliable backup solution. Mac users can utilize SuperDuper for this purpose, while a detailed guide for Windows users is available courtesy of Tina.
iOS Backup Procedures
For Apple’s iOS devices, backups are typically created automatically by the computer the device synchronizes with. Upon acquiring a new phone, restoration of applications and purchases is a straightforward process.
To verify backup status, connect the device to iTunes and access the sidebar (connectivity isn't always required with recent versions on the same network). The Summary tab displays the Backup section, including details of the most recent backup.
Android Backup OptionsAndroid devices exhibit considerable variation, but versions 4 (Ice Cream Sandwich) and later automatically back up purchases and settings to your Google Play account. Confirmation of this functionality can be found within the Android Devices section of your Google Dashboard.
For older Android devices, or for users with rooted access, Titanium Backup is often the preferred method for creating backups.
Data Security Through Secure FormattingMany individuals prioritize deleting their data before disposal, however, a significant number are unaware that previously deleted information remains potentially recoverable through specialized software. Utilizing readily available recovery tools, data can be extracted from a drive with relative ease.
These programs function by reconstructing fragmented data, piecing together remnants of files – including images, documents, and audio – even after deletion. Such software is often available for purchase at a cost of under $100.
How Data Recovery Works
The process of data extraction, even on files thought to be deleted, succeeds because simply “deleting” a file doesn’t actually remove it from the storage medium. Instead, the system marks the space occupied by the file as available for reuse, and removes the file’s entry from the directory index.
The underlying data – the 0s and 1s constituting the file – persists on the drive.
Implementing Secure Deletion
Secure deletion addresses this vulnerability through varying levels of complexity. The core principle remains consistent: overwriting the disk area where the file was originally stored is essential.
A fundamental technique, known as “single pass,” involves writing 0s across the targeted data area just once.
While sufficient for many scenarios, advanced recovery techniques may still uncover traces of the overwritten data. For highly sensitive information, multiple passes are recommended, employing not only zeros but also randomized data written repeatedly over the original file location.
The US Department of Defence standard dictates a robust 7 passes for secure data erasure, rendering recovery virtually impossible.
Tools for Secure Formatting
Are complex systems necessary to achieve this level of secure formatting? Not at all.
On macOS, access Disk Utility, select the desired drive, navigate to the Erase tab, and then choose Security Options.

Windows users can utilize the DISKPART command-line utility to “clean” a drive, effectively performing a secure format.
It’s important to note that securely erasing the system drive is not possible through these standard methods, as it would erase the operating system itself. In such cases, employ a bootable disk specifically designed for secure erasure, like DBAN for PCs, or boot from the macOS installation media and access Disk Utility via the Tools menu.
Secure Deletion on Mobile Devices
For Android devices, securely delete any SD card using the Windows method previously described. While Android offers a factory reset option, its security is reportedly limited.
For devices with a system partition, enabling encryption via Settings -> Security -> Encrypt, followed by a factory reset, is advisable. This feature is available on Android Ice Cream Sandwich and later versions; older versions may require alternative methods.
iOS devices benefit from automatic data encryption, making recovery exceptionally difficult. To securely wipe an iOS device, go to Settings -> General -> Reset -> Erase all content and settings.
Operating System Reinstallation
When preparing a computer for a new user, a fresh operating system installation is often a considerate practice. Many pre-built computers and laptops include restore discs, allowing a return to the factory settings. Be prepared to enter the product key, typically found on a label affixed to the device, when requested during the process.
Should these recovery discs be unavailable or lost, Linux presents a viable alternative. Ubuntu, in particular, boasts extensive online documentation – including several guides we’ve created – that a thoughtful seller would download and conveniently place on the desktop for the new owner.
Choosing an Operating System
While you could list the computer as being supplied “without an operating system,” this may confuse some buyers. This ambiguity could potentially lead to negative feedback on platforms like eBay or result in unnecessary inquiries.
It is crucial to avoid installing software without a valid license. Doing so could create legal complications for both parties involved should the computer require repair or the user seeks support from the software vendor.
Important Considerations:
- Always retain and provide original installation media when possible.
- If using Linux, ensure the new owner has access to necessary documentation.
- Never install unlicensed software.
Prioritizing a clean and legally compliant OS installation demonstrates professionalism and respect for the future user.
Removing DRM Authorization from Purchases
Digital Rights Management, or DRM, is frequently incorporated into media today, as seen with platforms like iTunes. iTunes permits the downloading of purchased content onto a maximum of five devices. However, this limit can be reached quickly, especially for users with multiple Apple products like Macs, iPads, and iPhones, and those who frequently upgrade.
Fortunately, a straightforward method exists to deauthorize all currently registered devices simultaneously, though this action is limited to once annually. Within iTunes, navigate to the iTunes Store via the sidebar. Subsequently, log in to your account and access your account details.
From this account view, the option to Manage Devices becomes available.
Currently, my account shows six authorized devices, despite Apple’s stated limit of five; this discrepancy may relate to a distinction between computers and mobile devices.
Individual devices can also be authorized or deauthorized directly through the iTunes Store menu on that specific device. It’s important to note that account authorization changes are restricted to once every 90 days.
Beyond iTunes, numerous other services employ DRM. Therefore, it’s advisable to review your subscriptions and accounts to identify any necessary deauthorizations.
Do you maintain a personal checklist for preparing devices for sale or donation? Share your recommendations in the comments below – your input is greatly appreciated!
Image source: ShutterStock: Computer Hacker