Sunday, 4 September 2016

Factory Resetting You Andriod Phone Doesn't Wipe All Your Data: See Why And How You Can

Performing a factory reset on your android phone save you some worries like fixing bugs following android update, general housekeeping for maintaining android performance and completely wiping data from your phone.

The only issue is that Googles built in factory reset option can expose your data even after a reset.

Why Do Factory Reset Doesn't Wipe All My Data 
Formerly we have been told that factory reset will delete all data,account,password,contact, files and content from you android phone but on my long research, I come to conclude that this is partially true.

From a report from some phone gurus in  Cambridge University, the made some research on Android devices running Android versions from Android 2.3 to Android 4.3 and found that in all cases they were able to recover account tokens – which are used to authenticate you once a password is entered the first time – from service providers such as Google, Facebook, and WhatsApp. In a staggering 80 percent of cases, they were able to recover the master token.

The master token is essentially the key to the front door, the equivalent of installing a top-notch security system and then hiding the key under the doormat. Once a master token is recovered, the user’s credential file can be restored and all your data re-synced to the device: that means emails, cloud-stored photos, contacts, and calendars.

How Could It Happen
There are a few reasons. Part of the blame is with the manufacturers who simply don’t provide the software required to fully wipe flash storage. Likewise, flash storage is notoriously hard to wipe, and of course, Google is to blame for not providing a more fail-safe option for users.

The researchers went on to note that while security and antivirus companies may use these findings to promote their own tools and services that the only real solution was likely to come from the vendors themselves.
Unfortunately, even devices with built-in encryption are not safe from this weakness. The decryption key is also left intact on a device once it has been factory reset. While that key is itself encrypted, gaining access to it would be a few days’ worth of work for most hackers, according to the researchers.

What You Can Do About It
It must be noted that devices running Android 4.4 and above were not tested, so it is not clear whether devices running Android KitKat and Lollipop are also affected, although the researchers were quick to point out that it’s plausible that they could be.

The main things one can do to protect themselves is to encrypt their phone and use a strong, randomly generated password that contains a mixture of upper- and lower-case letters, numbers, and symbols and is at least 11 characters long. The issue with this is that it is sufficiently awkward to do on a regular basis that most users simply won’t do it.

Alternatively, once a phone has been factory reset, the flash storage can be refilled with useless data to overwrite the tokens and crypto keys left in flash storage. Of course, the app used to fill the phone would need to be installed outside of Google Play to avoid a Google token being registered on the device once again. The only other solution the researchers came up with was to destroy the device.

This solution, however, raises issues for users that find themselves with a lost or stolen device, or for those devices that have been remotely wiped with Android Device Manager. Until a legitimate solution can be found, just be careful who you sell your second-hand phone too.

If this post is helpful to you, take your time to drop your comments and thought in the comment box.

Get Our Free Browsing via Sms. SMS Follow Wisprofblog to 40404. On Any Network And Sms is free. Join Our: Telegram Group Here Whatsapp Group Here.

No comments:

Post a Comment

If you have not known! Kindly click here and see why you should always comment on any post on this blog (