Android’s ‘factory wipe’ not too clean

Security firm Avast says it found hundreds of naked selfies on older, secondhand Android phones because ‘wipe’ doesn’t erase data

July 19, 2014 04:03 am | Updated 04:03 am IST

Hundreds of naked selfies and intimate pictures of both men and women were found on a batch of Android smartphones that their owners thought they had wiped, a research study has found.

After studying 20 handsets, security company Avast has warned that the “factory reset” function on Android phones doesn’t actually delete data on the phone, which can be retrieved using standard forensic security tools.

In all, the researches said that they found more than 40,000 photos, including 750 photos of women “in various stages of undress” and 250 photos of male anatomy. The EXIF data included in the picture file could also allow someone to find out details of the person’s residence if it included location. Four of the phones included the previous owners’ identity in the file data.

The problem arises because the factory reset function, found in the Settings function, doesn’t actually wipe the data from the storage on the phone. Instead, it wipes the index that points to the locations in the storage where the data is written. Normally, that is sufficient to prevent someone who acquires the phone from accessing any of that data.

But by using forensic tools that directly access the storage areas, Avast was able to reconstruct the files, and make its disconcerting discovery.

Google told technology news and information website Ars Technica that the research “looks to be based on older devices and versions [of Android] and does not reflect the security protections in Android versions that are used by 85% of users.” That suggests that only versions running software before Android 4.0 are vulnerable in this way.

However, Google’s Android documentation shows that setting file encryption is optional — which leaves newer devices vulnerable too. Android 3.0 onwards has offered a setting which will encrypt the phone, using a cryptographic key generated from a user-provided passcode. If that is done, then a “factory reset” will delete the key, rendering the data unreadable. Google’s spokesperson recommended that people who are disposing of a device should enable encryption, and then carry out a factory reset.

Apple’s iPhones and iPads encrypt their data using the AES 256 algorithm, with a software key that is generated using information from the user.

When the owner chooses to “erase all content and settings” to wipe an iPhone or iPad, the cryptographic key is deleted — meaning that although the data remains on the phone, it is encrypted beyond any capability to decode it.

© Guardian Newspapers Limited, 2014

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.