In this way, your old mobile phone can be safely sent for recycling

Original title: with this method, your old mobile phone can be safely sent for recycling

Nowadays, businesses such as recycling waste electronic parts and reselling waste computers and mobile phones can be seen everywhere As we all know, one click deletion, factory settings restoration and other seemingly “safe” operations still put your privacy data at risk of leakage.

A few days ago, the discarded parts of Tesla’s products have been exposed to divulge users’ privacy data. Some hackers said that in the second-hand parts purchased, although each control unit has been restored to the factory settings, it can still recover a lot of data from the system, such as GPS positioning information. In addition, hackers can also access the complete contact list, call records, calendar information of users before the control unit, as well as the account ID and password of third-party applications that have run on the control unit.

Long term storage at home not only takes up space, but also has security risks, and there is a risk of data leakage when it is sold to the second-hand market. Where should waste electronic products “settle down”?

Data deletion and storage disadvantages: low threshold of privacy stolen through discarded electronic products

The reporter opened an e-commerce platform and found that thousands of stores said that they could provide services to recover mobile phone and computer data, including but not limited to SMS, photos, contacts, call records, etc., with prices ranging from tens to hundreds of yuan.

Why can data in electronic products still be recovered after deleting or restoring factory settings? It turns out that restoring factory settings is mainly to restore to the default state of the factory, mainly involving the boot interface, standby mode, operation shortcut key, timing reminder and other functions, and the previously saved parameter settings will be deleted. However, this process does not necessarily cover the storage space of the mobile phone, and part of the data can still be recovered by technical means.

As for the underlying principle, 360 security experts told Science and Technology Daily that in order to improve the response speed and avoid the repeated “clearing” of memory chips, the deletion and formatting commands in the operating system are not really “completely clearing”, but directly mark the position occupied by the original data as “blank” in the data table. In fact, the data still exists I’m here. Just like a book, in most cases, data deletion actually only removes the directory of the book, but the content of the book is still there.

“Data recovery technology is to reconstruct the original partition and directory structure of the lost directory and file in the memory by reading the original data in the hard disk or chip and according to the data reorganization analysis technology.” 360 security experts said.

Compared with network intrusion, what are the characteristics of stealing data through discarded electronic products?

On the whole, the threshold of network intrusion is relatively high. The intruder mainly attacks the operating system and software vulnerabilities, and only through the open external access port of the target. This requires the intruder to have professional knowledge, understand the computer language, have a lot of hacker tools, and spend a lot of time and energy to learn and master.

It’s much easier to steal data from discarded electronic products. “Based on the existing mobile phone or hard disk storage properties, as long as we develop a data recovery system tool, we can recover data from the hard disk or mobile phone storage.” Liu Simon, assistant dean of School of mathematics and computer science of Fuzhou University and director of Key Laboratory of network system information security of Fujian universities, said for example that it may take less than an hour for second-hand mobile phone manufacturers to recover all the data before the mobile phone.

The electronic “mine” needs to be developed, and the mobile phone recovery rate is less than 2% due to concerns about information security

Nowadays, every household has idle used mobile phones. Considering that personal information is easy to leak and other reasons, most people are not willing to take out old mobile phones and computers for recycling.

In 2019, China Electronic Equipment Technology Development Association released the report on recycling economy potential of China’s discarded electronic products, which shows that the recovery rate of China’s current electronic products is not high. Take mobile phones as an example, the recovery rate is less than 2%.

“Many waste electronic parts can be recycled into new products to give full play to the efficiency of components.” 360 safety experts pointed out that if the waste electronic products are not handled properly, it will cause great pollution to our environment. For example, a button battery can pollute nearly 600000 liters of water resources.

According to Professor Huang Xinyi of School of mathematics and information of Fujian Normal University, there are two main ways to reuse waste electronic products. One is to reprocess the waste electronic products, replace the damaged parts, so as to restore the use function, so as to continue to enter the market and provide services for consumers; the other is to decompose the electronic products that are seriously damaged or cannot be repaired To extract copper, tin, palladium, plastics and other available resources, and then enter the market again after processing to provide raw material support for the industry or other industries.

The report on the recycling economy potential of China’s discarded electronic products also points out that there is more than 270 grams of gold in every ton of discarded mobile phones, and the amount of discarded electronic products in China will reach 27.22 million tons by 2030. If the recovery rate is increased to 85%, the total value of recovered metals including gold will reach 130 billion yuan.

At the same time, the recycling of waste electronic products to obtain metals will save about 30 billion kwh of electricity energy and reduce carbon emissions by nearly 22 million tons, which is equivalent to saving 26000 times of carbon emissions of a Boeing 747-400 from Beijing to New York.

“The ‘gold content’ of waste electronic products is much higher than that of ordinary high-quality primary mines. Developing the recycling economy of waste electronic products and realizing the recycling of metal resources can not only stabilize the supply of metal resources, but also realize the win-win economic and environmental benefits. Therefore, the ‘sleeping mine’ of waste electronic products needs to be awakened.” Huang Xinyi said.

Let waste electronic products be reborn experts teach you some irreversible ways of data destruction

The main reason why waste electronic products can not be effectively developed and utilized is that the public has high concerns about the personal information security of recycling equipment. Can we find a way to eliminate the public’s concern about privacy disclosure, so as to bring new life to discarded electronic products? Is there an effective way to completely destroy data in mobile phones, computers and other electronic products?

“At present, the conventional and effective way of data destruction is data coverage.” Huang Xinyi pointed out that for individual users, they can use unimportant data to fill the disk many times and then delete it, so as to cover the original deleted data. The principle is to let these irrelevant data replace and erase the sorting and traces of important data, so as to ensure that important privacy data cannot be retrieved. For example, the storage space of the mobile phone is 16g. After deleting important data, you can copy some large files such as movies to the mobile phone until the storage space is exhausted.

In addition, physical destruction methods such as magnetic field and high temperature can also be used. “Because the disk uses the principle of magnetic particle adsorption to store data, the high-intensity magnetic field will directly destroy all the information in the disk, and this kind of damage is almost impossible to recover. Similarly, high temperature will directly change the physical structure of the disk, and this damage is irreversible. ” Simon Liu said.

The reporter noted that in promoting the recycling of waste electronic products and data protection, China is still facing problems such as imperfect supporting laws and regulations and inadequate supervision.

360 experts suggest that the government should set up a recycling mechanism of waste electronic equipment in the form of policy, and fully consider the information security and data security of users, improve the disposal process and regulatory agencies of waste electronic products, ensure strict implementation in accordance with the process, and build special recycling points when necessary, so that users can safely handle mobile phones, computers and other electronic equipment. At the same time, we should increase the crackdown and punishment on data leakage.

There are many effective experiences abroad for reference. For example, in 2018, the European Union formulated the general data protection regulations, which formed the data protection and privacy norms for all EU individuals, involving personal data export outside Europe and other aspects. In addition, Canada has set up perfect supporting facilities and information sharing platform. The government provides residents with the latest recycling information to improve the convenience and pertinence of recycling.

Huang Xinyi suggested that the relevant waste electronic product recycling enterprises should standardize the management of waste electronic product recycling points, sign cooperation agreements with relevant professional data cleaning service organizations, sign written commitments for user data cleaning and information security, track, evaluate and supervise the implementation process, and achieve transparent treatment, so as to make users more assured.

(editor in chief: Zhao Chao, LV Qian)