	{"id":152,"date":"2008-05-21T08:09:51","date_gmt":"2008-05-21T07:09:51","guid":{"rendered":"http:\/\/blog.intego.com\/?p=152"},"modified":"2012-12-12T13:49:11","modified_gmt":"2012-12-12T21:49:11","slug":"refurb-iphones-may-contain-personal-data","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/","title":{"rendered":"Refurb iPhones May Contain Personal Data"},"content":{"rendered":"<p>A <a href=\"http:\/\/www.iphoneatlas.com\/2008\/05\/19\/refurbished-iphones-may-contain-other-users-personal-data\/\">report has surfaced<\/a> about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a detective from the Oregon State Police found that an out-of-the-box refurb iPhone contained much sensitive data. The article doesn&#8217;t specify exactly what, but it&#8217;s likely that it contained e-mails and, perhaps, user names used with Safari.<\/p>\n<p>The problem here is that the restore process used to wipe the iPhone doesn&#8217;t really delete the actual data it contains, but only erases the disk catalog. Files and data can still remain on the iPhone, and with the right software this is accessible. While most people don&#8217;t have software that can do this, some, as this article shows, have access to such tools.<\/p>\n<p>Whenever you return a device that you have used, there remain traces of your activity, some of which may lead to identity theft if exploited. One problem with the iPhone is that there is no way to securely delete its contents. We <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-you-send-your-mac-for-repairs-think-security\/\">wrote about this last year<\/a>, explaining how to securely erase a Mac before sending it out for repairs, or selling it or giving it away. For an iPhone, one suggestion is to fill the iPhone with music &#8211; leaving as little free space as possible &#8211; to overwrite as much of its storage as you can. Until there is a real disk management tool for the iPhone, there is no other choice: there is no equivalent to Disk Utility for the device, though we may see one when the iPhone starts accepting applications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a detective from the Oregon State Police found that an out-of-the-box refurb iPhone contained much sensitive data. The article doesn&#8217;t specify exactly what, but it&#8217;s likely that it contained e-mails [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Refurb iPhones May Contain Personal Data - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-05-21T07:09:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/\",\"name\":\"Refurb iPhones May Contain Personal Data - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-05-21T07:09:51+00:00\",\"dateModified\":\"2012-12-12T21:49:11+00:00\",\"description\":\"A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Refurb iPhones May Contain Personal Data\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Refurb iPhones May Contain Personal Data\",\"datePublished\":\"2008-05-21T07:09:51+00:00\",\"dateModified\":\"2012-12-12T21:49:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#webpage\"},\"wordCount\":267,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/","og_locale":"en_US","og_type":"article","og_title":"Refurb iPhones May Contain Personal Data - The Mac Security Blog","og_description":"A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a","og_url":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-05-21T07:09:51+00:00","article_modified_time":"2012-12-12T21:49:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/","name":"Refurb iPhones May Contain Personal Data - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-05-21T07:09:51+00:00","dateModified":"2012-12-12T21:49:11+00:00","description":"A report has surfaced about a refurbished iPhone that was found to contain some personal data from the previous user. Using a forensic software program, a","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Refurb iPhones May Contain Personal Data"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Refurb iPhones May Contain Personal Data","datePublished":"2008-05-21T07:09:51+00:00","dateModified":"2012-12-12T21:49:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/refurb-iphones-may-contain-personal-data\/#webpage"},"wordCount":267,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2s","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/152"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/152\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}