Privacy Tools Guide

Selling your old smartphone requires more than tapping “Factory Reset” in settings. Modern devices store sensitive data across multiple partitions, and a simple reset does not guarantee complete data destruction. This guide covers the technical steps to securely wipe Android and iOS devices, verify deletion, and ensure your personal data cannot be recovered.

Understanding Mobile Storage Architecture

Before wiping a device, understand how data is stored. Smartphones use flash storage (NAND or UFS) organized into partitions:

A standard factory reset primarily erases the user data partition pointers, marking space as available for overwriting. The actual data remains until new data overwrites it. This is why forensic tools can recover data from improperly wiped devices.

Android: Secure Factory Reset Process

Step 1: Encrypt the Device (Pre-Reset)

Encrypting the device before resetting adds a critical layer of protection. Even if partial data is recovered, it will be cryptographically unintelligible.

# On Android, enable encryption in Settings:
# Settings → Security → Encrypt Phone
# Or via ADB for advanced users:
adb shell sm encryptable /data

Full disk encryption (FDE) or file-based encryption (FBE) ensures that reset data remains scrambled.

Step 2: Perform Factory Reset via Recovery Mode

Android’s built-in reset can be inconsistent across manufacturers. Using recovery mode provides more reliable results:

  1. Power off the device completely
  2. Press and hold Power + Volume Down (varies by manufacturer)
  3. Select Recovery Mode
  4. Choose Wipe data/factory reset
  5. Select Wipe all user data or Format data (if available)

For devices with Android 10+, use File-Based Encryption. Select the option to format rather than just wipe.

Step 3: Verify Encryption is Active Post-Reset

After reset, boot into recovery again and check if encryption is still prompting. If the device asks for a password or shows encrypted storage, your previous encryption keys are gone—good sign.

# Check encryption status via ADB (requires root on some devices)
adb shell
$ su
$ vdc volume get EncryptionState

iOS: Secure Factory Reset Process

iOS devices with Secure Enclave provide hardware-level encryption, but proper reset procedure is still essential.

Step 1: Disable Find My and iCloud

This is mandatory. A device with Find My enabled cannot be properly activated after reset.

# On the device:
# Settings → [Your Name] → Find My → Find My iPhone → OFF
# Settings → [Your Name] → iCloud → Sign Out

Step 2: Erase All Content and Settings

iOS offers a built-in secure erase:

  1. Go to Settings → General → Transfer or Reset iPhone
  2. Select Erase All Content and Settings
  3. Enter passcode if prompted
  4. Confirm erasure

This process sends a command to the Secure Enclave to delete encryption keys, making all data permanently unrecoverable.

Step 3: Verify via DFU Mode (Advanced)

For maximum certainty, perform a Device Firmware Update (DFU) restore:

  1. Connect device to computer with Finder/iTunes
  2. For iPhone without Home button: Press Volume Up, then Volume Down, then hold Power until screen goes black
  3. Continue holding Power + Volume Down for 5 seconds
  4. Release Power while holding Volume Down until iTunes detects recovery mode
  5. Restore the device through iTunes/Finder

This completely rewrites the firmware and all partitions.

Cross-Platform Verification Techniques

After resetting, verify data destruction:

Forensic Recovery Test

If you have technical capability, attempt recovery using tools like:

# Using TestDisk for partition analysis
# (Requires device storage read via JTAG or chip-off)
testdisk /dev/sdX

# Using PhotoRec for file carving
photorec /dev/sdX

Successful recovery indicates incomplete wipe. Modern encrypted devices should show no recoverable personal data.

Check Available Storage

After reset, the reported storage should show near-full capacity available:

# On Android (via ADB when booted)
adb shell
$ df -h /data

If /data shows minimal usage (less than 1-2GB on modern devices), the wipe was effective.

Boot Verification

A properly wiped device should:

Advanced: Encrypt-and-Wipe Method

For maximum security before selling, perform an encrypt-then-wipe:

  1. Enable maximum encryption on the device
  2. Fill storage with dummy data to overwrite all blocks
  3. Factory reset

This technique ensures that even if some unencrypted blocks remain, they contain meaningless dummy data.

# Fill storage via ADB (requires root)
adb shell
$ su
$ dd if=/dev/zero of=/sdcard/fillfile bs=1M count=10000
$ rm /sdcard/fillfile

Repeat this process 2-3 times for better coverage, though modern encryption makes single-pass overwrite sufficient.

Additional Considerations

Remove SD Cards and SIM Cards

Always physically remove and retain:

Before wiping, ensure these are removed:

Factory Reset Protection (FRP)

Understand FRP:

Built by theluckystrike — More at zovo.one