Understanding the Vulnerabilities in Selling Your Phone

Recent events highights the need to safeguard the vast personal data stored on our phones.

By Sunil Sonkar
2 Min Read
Understanding the Vulnerabilities in Selling Your Phone

Our phones are housed with a plethora of personal information. So, do we really understand how secure is this vast data? Some of the recent events have shed light on the importance of safeguarding our information.


According to cybersecurity researcher Somdev Sangwan, one of the most common ways our data gets compromised is when we sell our phones without erasing sensitive information properly. Do know that that simply deleting data is not enough. Hence, it is suggested to add some “junk data” before deleting the data.

Moreover, it is also important to know how we lock your phone. Is it that we are using a PIN, fingerprint or facial recognition? Each method has its vulnerabilities. The researcher adds that even facial recognition can be bypassed with clever tricks.

But it is not just about physical access. Sangwan explains that leaked software or tools which are used to unlock our devices can also pose a threat to everyone’s security. This is the reason it is suggested to maintain good password hygiene.

Now, w it comes to cloud services such as iCloud, security measures does exist to a great extent. However, these are also not foolproof.

Well, what if law enforcement wants access to the phone data? It is said that while authorities have the power to seize devices for investigation, citizens also have rights. It is learned that refusing to share passwords or data is within the rights of the citizens and it is outlined in Article 20(3) of the Indian Constitution.

In one of the recent legal rulings the Delhi High Court reinforced such protections and stated that individuals cannot be forced to disclose passwords. The court cited the right against self-incrimination.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *