Verify any claim · lenz.io
Claim analyzed
Tech“As of 2026, factory reset does not reliably erase all personal data from electronic devices, and significant amounts of recoverable personal information remain on many second-hand devices sold or recycled worldwide.”
The conclusion
The core assertion holds: factory resets perform logical deletion rather than physical data destruction, and authoritative technical standards (NIST SP 800-88) classify them as insufficient for assured non-recoverability. Real-world audits of second-hand devices have consistently found recoverable personal data on substantial fractions of resold units. However, the claim understates the protection offered by modern encrypted smartphones, where factory reset destroys encryption keys, rendering residual data practically inaccessible. Some frequently cited prevalence statistics also predate 2026 by nearly a decade.
Based on 22 sources: 18 supporting, 0 refuting, 4 neutral.
Caveats
- Modern smartphones with default full-disk encryption (Android 6+ and iOS) destroy encryption keys during factory reset, making residual data cryptographically inaccessible in most practical scenarios — a significant mitigation the claim does not acknowledge.
- Key statistics about recoverable data on second-hand devices (e.g., the widely cited 35% figure) originate from a 2015 study and may not reflect the 2026 encrypted-device landscape.
- The claim's broad scope ('electronic devices') spans highly variable categories — phones, hard drives, USB sticks, IoT devices — with very different reset reliability, making any single generalization inherently imprecise.
Get notified if new evidence updates this analysis
Create a free account to track this claim.
Sources
Sources used in the analysis
Many companies still assume that a factory reset or standard data wipe is enough to protect user information. That may have been true ten years ago, but in 2026, these methods don’t come close to the security needed for commercial device turnover. Traditional resets fail for several reasons: Residual data remains recoverable through forensic tools.
Previous investigations showed that the threat of remnant data on second-hand or recycled electronics is real and serious. For instance, they demonstrated that more than half of the second-hand storage devices include remnant data—in clear or recoverable through specific tools (i.e., widely available forensic tools). These studies reported recovering business documents, medical case reports, financial information (e.g., credit card pin numbers or private keys associated with crypto assets), personally identifiable information (e.g., vehicle registration numbers, phone numbers), and even highly sensitive data such as photos of an intimate nature and pornographic content.
While a factory reset removes user access to data and restores the operating system to its default state, it does not necessarily erase the underlying data at the physical level. Logical deletion occurs when the system removes file pointers or references, marking storage as available while leaving the actual content intact until overwritten. This allows previously stored data—such as messages, photos, or app information—to be potentially recovered with forensic tools.
Following a complaint alleging insufficient wiping of returned devices, the OPC launched an investigation into the organization's internal practices. The investigation found that the organization had not implemented adequate measures to protect personal information from unauthorized access or disclosure, particularly due to inadequate internal policies and training, and the absence of effective control mechanisms. In its conclusions, the OPC states that, to be considered adequate under principles 4.7.1 and 4.7.3, wiping procedures must comply with the device manufacturer's guidelines for resetting and wiping data.
Research and practical experience show that residual data often remains, including messages, photos, emails, app data, and account credentials. Standard resets do not always overwrite all storage areas, meaning some information can still be recovered with specialized tools. A research paper from Cambridge University found that even after performing a factory reset on Android devices, certain partitions still retained data generated during device use.
A factory reset does not always permanently delete data. A reset removes access to files, but it may not erase the data itself. On many devices, data can still exist until new data overwrites it.
A factory reset doesn’t instantly and permanently erase all data. On flash memory devices (like the storage in your Android phone), the reset process typically does two things: 1. Deletes the Encryption Key: Modern Android phones (Android 6.0 and later) use full-disk encryption. A factory reset wipes the key needed to decrypt the data, making the old data inaccessible to unauthorized users. 2. Removes Pointers: It removes the “pointers” or “table of contents” that tell the operating system where a file physically begins and ends. The actual data remains on the chip, marked as “available” to be overwritten by new data.
While being more affordable and environment-friendly than brand-new products, transactions of second-hand products can create new security and privacy threats. The problem can be even more severe if the second-hand product has storage capabilities, including but not limited to smartphones, tablets, laptops, hard drives, memory cards, or USB sticks. Such devices could include some so-called remnant personal data (i.e., data that can still be found on the device) or malware.
A factory reset on a Windows Phone simply removes data pointers. The actual data remains intact and can be recovered with basic tools. In a 2015 study by Blancco Technology Group and Kroll Ontrack, researchers purchased over 120 used phones online. They found that 35% of those phones still contained recoverable data—including texts, emails, photos, and more.
An analysis of secondhand mobile devices found that 35% still contained recoverable data even after being factory reset and resold. This highlights the risks of relying solely on factory resets without a disposal plan. Even if you erase your data manually, it might not be enough. Often, deleted files can be recovered with the right tools.
When devices reach end-of-life, the data stored on them doesn't simply disappear. Even deleted files, reformatted drives, and “factory resets” leave data potentially recoverable without proper standards.
NIST SP 800-88 Revision 1 (updated 2014, still authoritative in 2026) classifies factory resets as 'Clear' method, suitable for low-risk data but insufficient for sensitive information as it does not guarantee non-recoverability by advanced forensic tools, especially on SSDs and mobile NAND flash.
A factory reset does not guarantee the irrecoverability of sensitive data. Depending on the device model, encryption, and how the factory reset was performed, data may still be recoverable in some cases. The risks are especially high for older Android models with unencrypted storage.
In 2026, data recovery technology has become very mature, and there are many methods you can try to recover formatted files. This article will provide you with detailed information on free formatted data recovery methods to help you recover important files lost due to formatting.
Treat suppliers as part of your risk profile. Most serious breaches involve third parties. Check their security, contracts, and data handling practices before you share anything.
Secure erasure ensures compliance with strict regulations, prevents breaches, and enables device reuse while minimizing e-waste.
Factory reset isn't enough by itself to securely erase data before selling a phone in 2026.
61% of Americans say limiting access to their personal data is very important, but 33% admit to taking only moderate care in protecting it. 56% are concerned that wearable devices could reveal personal lifestyle details to companies, making wearables a top data privacy concern.
Tech companies rely heavily on third-party providers, including cloud hosting services, payroll and HR platforms, analytics vendors, AI tools, CRM and marketing platforms, and messaging platforms. Third-Party Risk Is Employer Risk.
Supports recovery after factory reset, works on most Android brands. Firstly, free download and open iMobie DroidKit on your computer, then click quick recovery from device, then select quick recovery from device under recover lost data. Now you will see various data types that the program supports for recovery.
This video will show you 3 effective ways to recover data from Samsung phone after factory reset. Sometimes, we may have to do a factory reset to our Samsung devices to make the phone work. All data will be erased after factory reset Samsung.
Accidentally performed a factory reset on your Android or iPhone and lost all your photos, videos, contacts, and files? Don’t panic — in this video, I’ll show you how to recover data after a factory reset. Stellar consistently finds more recoverable files, especially after formatting or a factory reset.
What do you think of the claim?
Your challenge will appear immediately.
Challenge submitted!
Expert review
How each expert evaluated the evidence and arguments
Expert 1 — The Logic Examiner
The supporting evidence establishes (a) factory reset often performs logical deletion and may leave data technically present and sometimes forensically recoverable (Sources 1,3,5,11,12), and (b) empirical audits of second-hand devices have repeatedly found substantial fractions containing remnant/recoverable personal data (Source 2; Sources 9–10), which together supports the claim that factory reset is not a reliable guarantee and that many used devices still leak data. The opponent correctly notes scope/recency limitations (e.g., older studies and the mitigating effect of encryption per Source 7), but those points at most narrow the claim's universality; they do not logically negate “not reliably” across the heterogeneous global second-hand/recycling stream that includes older/poorly wiped devices, so the claim is mostly true rather than fully proven at a precise worldwide rate in 2026.
Expert 2 — The Context Analyst
The claim omits that on many modern smartphones (notably Android 6+ and iOS with default encryption), a factory reset typically destroys encryption keys so leftover bits may be physically present but not practically readable, and several cited “recoverable data” stats are old or undated and mix device categories (e.g., 2015 used-phone study in Source 9; broad second-hand storage summaries in Source 2) rather than specifically measuring 2026-era encrypted phones. Even with that context, it remains accurate in overall framing that factory reset is not a universally reliable sanitization method across the heterogeneous second-hand/recycling ecosystem (including older/unencrypted devices, mis-implemented resets, and non-phone storage media) and that substantial numbers of resold/recycled devices still expose personal data in practice, so the claim is mostly true rather than fully established as stated for all “electronic devices” in 2026 (Sources 1,3,12,13).
Expert 3 — The Source Auditor
The most authoritative sources in this pool are PhoneCheck (Source 1, high-authority industry specialist, 2026), E4S (Source 2, research center report), SalvationDATA (Source 3, forensic data recovery specialist, 2025), Gowling WLG (Source 4, major international law firm, 2026), and the NIST SP 800-88 reference via LLM Background Knowledge (Source 12), all of which confirm that factory resets do not guarantee non-recoverability of personal data. The opponent's strongest counter-argument relies on Source 7 (CompanionLink, a software blog of moderate authority) and Source 13 (NSYS Group, moderate authority, undated), which note that modern encrypted Android devices render residual data cryptographically inaccessible — a valid technical nuance. However, the opponent's rebuttal correctly identifies that the 35% statistic in Sources 9 and 10 (Securis, AccuShred) traces back to a 2015 Blancco/Kroll study, making it outdated for a 2026 claim; similarly, Source 2 (E4S) and Source 8 (True Cost of Food, a food-focused website of unclear authority on electronics) aggregate studies of undated vintage across all storage types including unencrypted legacy hardware. Despite these weaknesses, the broader claim — that factory reset does not reliably erase all personal data and that significant recoverable data remains on many second-hand devices — is well-supported by the technical consensus from high-authority sources (NIST SP 800-88 classifying factory reset as merely a "Clear" method, forensic specialists confirming logical rather than physical erasure) and by real-world regulatory findings (Gowling WLG/OPC investigation, Source 4). The encryption argument is a meaningful caveat for modern flagship devices but does not negate the claim's "reliably" and "many devices" framing, given the heterogeneous global second-hand market that includes older, unencrypted, and improperly wiped devices. The claim is therefore Mostly True: reliable sources confirm the core assertion with the important caveat that modern encrypted devices substantially reduce (though do not eliminate) practical recoverability risk.
Expert summary
The arguments
Two AI advocates debated this claim using the research gathered.
Argument for
Multiple independent 2025–2026 sources agree that a factory reset is largely a logical reset (clearing pointers/keys) rather than a physical eradication of stored bits, leaving residual data potentially recoverable with forensic tools—explicitly stated by PhoneCheck (Source 1), SalvationDATA (Source 3), NSYS Group (Source 5), and aligned with NIST SP 800-88's view that such “Clear” methods don't assure non-recoverability (Source 12). Real-world second-hand device investigations further show this is not theoretical: studies summarized by E4S report remnant data on more than half of second-hand storage devices (Source 2), and analyses cited by Securis/AccuShred found about 35% of used phones still contained recoverable personal data after reset and resale (Sources 9–10), demonstrating that significant recoverable personal information remains on many devices sold or recycled worldwide as of 2026.
Your reliance on the 35% statistic from Sources 9 and 10 is critically undermined by the fact that Source 9 itself attributes this figure to a 2015 Blancco/Kroll Ontrack study — a decade-old dataset that predates the widespread adoption of mandatory full-disk encryption on modern Android and iOS devices, making it wholly unrepresentative of the 2026 landscape the claim addresses. Furthermore, your appeal to Source 2's "more than half" remnant data finding suffers the same flaw, as it draws on investigations of undated vintage across all storage device types including unencrypted hard drives and USB sticks, while Source 7 (CompanionLink) explicitly confirms that modern encrypted Android devices render residual data cryptographically inaccessible after a factory reset — meaning your evidence base systematically conflates outdated, unencrypted hardware with the encrypted modern devices that dominate the 2026 second-hand market.
Argument against
The claim is undermined by Source 7 (CompanionLink), which explicitly acknowledges that modern Android devices (Android 6.0 and later) use full-disk encryption during factory reset, wiping the decryption key and rendering residual data cryptographically inaccessible — meaning the data, while physically present, is not meaningfully "recoverable" personal information in any practical sense. Furthermore, Source 13 (NSYS Group) concedes that recoverability risks are "especially high for older Android models with unencrypted storage," implying that on modern, encrypted devices the threat is substantially diminished, directly contradicting the claim's sweeping assertion that factory reset "does not reliably erase all personal data" across devices broadly in 2026.
You're equivocating on “recoverable” by treating CompanionLink's description of key deletion on some modern Androids (Source 7) as a universal guarantee, but the motion is about reliability across the real second-hand ecosystem, and multiple sources explicitly warn that factory resets still leave residual data potentially recoverable with forensic tools and are not sufficient for non-recoverability (PhoneCheck, Source 1; SalvationDATA, Source 3; NIST SP 800-88 summary, Source 12). And your appeal to NSYS Group (Source 13) is a cherry-pick: saying risk is “especially high” on older unencrypted models doesn't imply it's negligible elsewhere, while field evidence summarized by E4S and the used-phone studies cited by Securis/AccuShred show substantial fractions of second-hand devices still expose personal data in practice (Sources 2, 9, 10), which is exactly what “not reliably” means.