Factory Reset vs. Secure Deletion: Why a Key Wipe Alone Sometimes Isn’t Enough

When you perform cryptographic deletion—such as through a factory reset—only the key is removed, while the encrypted data remnants physically remain on the storage. Under unfavorable circumstances, a sufficiently motivated attacker might be able to reconstruct this data, for example by discovering backdoors, exploiting side-channel attacks, or leveraging enormous computing resources (like future quantum computers). Physical overwriting, on the other hand, relies on a proven principle:
According to international standards such as NIST SP 800‑88 or DoD 5220.22‑M, all storage areas are overwritten multiple times with random or patterned data until even forensic methods can no longer recover anything.
This exact two-stage concept—factory reset plus secure multi-pass overwriting—is implemented by iShredder™ iOS and iShredder™ Android. It ensures that all residual data is truly irretrievable. Moreover, the official DEKRA MASA L1 certification confirms that iShredder™ Android meets the strict requirements of the OWASP Mobile Application Security Verification Standard (MASVS) Level 1. If you truly want to ensure that sensitive data cannot be recovered, there’s no way around a consistent secure deletion solution like iShredder™.
Why a Key Wipe Alone Sometimes Isn’t Enough
Modern smartphones rely on hardware-based encryption to protect data. On the iPhone, for example, sensitive information is stored in the Secure Enclave Processor (SEP), which utilizes device- and user-dependent keys for security. When you reset an iPhone or iPad to factory settings, typically:
- The encryption key is deleted
- The operating system is reinstalled
In theory, no one can access the encrypted data anymore—as long as the key isn’t recoverable. Apple relies on this method (known as “cryptographic erasure”) and asserts that once a key is deleted, data recovery becomes practically impossible.
But When Could Cryptographic Deletion Fail?
Although a factory reset is usually sufficient for everyday use or “normal” security requirements, there are scenarios where military or highly sensitive users demand stronger measures:
- Risk of Key Recovery
Highly specialized attackers, state agencies with the necessary resources, or advanced forensic labs might find ways to reconstruct parts of the key from hardware leaks, log files, or by means of side-channel attacks. - Possible Backdoors
It’s unclear whether backdoors—intentional or unintentional—exist in devices or operating systems. Governments or military organizations, in particular, prefer not to rely on uncertainties; instead, they insist on physically overwriting the data.
Read more here:
https://www.protectstar.com/de/blog/apples-forced-icloud-backdoor-a-global-privacy-nightmare-and-what-it-means-for-you
Often, encryption is also “weakened” by manipulating random number generators, which in practice can drastically lower the actual encryption level—making it far easier to crack. - Long-Term Storage
Even if, at the time of the reset, nobody has the key, encrypted data remnants could be stored for years in archives (e.g., iCloud) or forensic dumps. With evolving technologies (e.g., quantum computers), it’s not impossible that encryption methods deemed secure today could be cracked in the future. - Wear-Leveling & Over-Provisioning
Flash memory often reserves background areas that remain “untouched.” This means data remnants could remain in sectors not accounted for during a key wipe.
The Advantage of Physical Overwriting
Physical overwriting operates on the principle that once overwritten, bits cannot be recovered. Using recognized methods like NIST SP 800‑88 or DoD 5220.22‑M, each memory cell is overwritten multiple times with random or patterned data, completely destroying any residual information. The risk that a subsequently recovered key could provide access to old data is reduced to almost 0%—there are simply no raw data left.
- Independent of Cryptographic Algorithms
Even if an encryption method were compromised in the future, overwritten data would remain irretrievably deleted. - Highest Level of Trust for Security Organizations
Military, government agencies, and large corporations with strict security requirements rely on physically empty, i.e., securely erased media. - Certified Standards & Documentation
Authorities often require erasure reports and compliance with standards like BSI TL-03423, NATO standards, or NIST guidelines—something a simple key wipe alone cannot provide.
How iShredder™ iOS Delivers Maximum Security
Protectstar™ uses a two-stage process:
- Factory Reset:
iShredder™ iOS first triggers the standard “Reset to Factory Settings,” removing the crypto key. - Physical Overwriting:
iShredder™ then uses a secure, recognized, and certified data erasure algorithm to overwrite all storage areas—from the visible partitions to reserve areas (as far as technically possible). These erasure algorithms are based on standards such as NIST SP 800‑88 (clean and purge), DoD 5220.22‑M, NATO Standard, BSI TL-03423, and many others.
The result: an iOS device whose storage is practically “empty”—regardless of potential backdoors or future advances in cryptography. Thanks to detailed erasure reports, this process can be documented in a way that withstands audits.
Legal Aspects and Data Protection
In Europe especially, the General Data Protection Regulation (GDPR) plays a crucial role. Companies may be legally obliged to securely erase personal data and, in some cases, even prove that they have done so. A solution that works in a forensically verifiable manner and can generate erasure logs offers a decisive advantage in this regard. It allows companies and government agencies to credibly demonstrate, if audited, that sensitive data has been irreversibly removed.
Properly Handling iCloud & Cloud Backups
Besides local storage, remember that a lot of data may also reside in iCloud or other cloud services. To ensure that no unwanted backups exist, you should check your iCloud sync settings, delete old iCloud backups, and possibly deactivate the service before resetting an iOS device. A similar approach applies to automatic Google backups on Android devices. Only when cloud data has also been removed can you rule out unpleasant surprises.
DEKRA MASA L1 Certification for iShredder™ Android: What Does It Mean for You?
In addition to iShredder™ iOS for Apple’s operating system, there is also the popular iShredder™ Android, which recently received official DEKRA MASA L1 certification. This certification confirms that iShredder™ Android meets the requirements of the OWASP Mobile Application Security Verification Standard (MASVS) Level 1. It ensures that:
- No critical security vulnerabilities are present,
- Strict OWASP requirements are fulfilled,
- The app is developed to be data protection-compliant and secure.
Many Android users assume that a simple file deletion is enough to irretrievably remove content. In reality, however, “deleted” data can often be recovered after a basic delete if it hasn’t been physically overwritten. iShredder™ Android overwrites your data multiple times using special patterns—irretrievably and forensically verifiable.
The DEKRA MASA L1 certification shows that:
- Protective mechanisms and coding standards have been observed,
- The highest level of security and quality is assured,
- An independent certification authority has verified the app against OWASP standards.
Easy Installation & Editions
You can find iShredder™ iOS and iShredder™ Android directly on our website at
www.protectstar.com/en/products/ishredder – available in both basic and advanced editions. Whether you’re a private user or a professional, there’s a version that fits your needs. You’ll also find detailed information on different erasure standards and other features on our product page.
Additional Security Tips
Before resetting your smartphone, you should manually log out or disconnect all accounts and services. For example, disable “Find My iPhone” and sign out of your Apple ID or Google account. This not only prevents error messages but also ensures your device no longer appears in any cloud overview. It’s also advisable to remove all SIM or memory cards. That way, all access points and potential data sources are separated before the actual erasure process begins.
Physical Destruction as a Last Resort
In particularly sensitive situations—such as military deployments or devices with irreparable malware infections—physically destroying the storage medium may be considered. Techniques like shredding, degaussing, or even thermal processes ensure that not a single storage sector survives. However, this is a specialized scenario and isn’t necessary for most civilian applications. For everyday secure data disposal, a reliable software solution like iShredder™ is more than sufficient.
Conclusion
For standard requirements, a simple factory reset (key wipe) may suffice. But as soon as higher or even the highest security demands arise, there’s no alternative to a genuinely forensic-grade data erasure. That’s exactly where iShredder™ comes into play:
With its unique combination of cryptographic deletion and physical overwriting to recognized standards (e.g., NIST SP 800‑88, DoD 5220.22‑M), iShredder™ gives you the confidence that no data remnants can ever be recovered.
Thanks to the DEKRA MASA L1 certification for iShredder™ Android, it’s now officially confirmed that all relevant OWASP guidelines are met—an unmistakable quality marker for private users, as well as governments and businesses with strict compliance requirements.
With iShredder™, you have a professional and globally trusted solution that adheres to military standards and prioritizes maximum data security in every edition.
Start now and enjoy the peace of mind that your confidential information is not just deleted, but verifiably and irreversibly destroyed.
Learn more at:
https://www.protectstar.com/en/products/ishredder