All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2705153",
"signature": "Article:2705153",
"url": "https://staging.dailymaverick.co.za/article/2025-05-06-selling-your-old-laptop-or-phone-you-might-be-handing-over-your-data-too/",
"shorturl": "https://staging.dailymaverick.co.za/article/2705153",
"slug": "selling-your-old-laptop-or-phone-you-might-be-handing-over-your-data-too",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Selling your old laptop or phone? You might be handing over your data too",
"firstPublished": "2025-05-06 15:00:34",
"lastUpdate": "2025-05-05 12:58:14",
"categories": [
{
"id": "1825",
"name": "Maverick Life",
"signature": "Category:1825",
"slug": "maverick-life",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-life/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6025,
"contents": "You’re about to recycle your laptop or your phone, so you delete all your photos and personal files. Maybe you even reset the device to factory settings.\r\n\r\nYou probably think your sensitive data is now safe. But there is more to be done: hackers may still be able to retrieve passwords, documents or bank details, even after a reset. In fact, 90% of second-hand laptops, hard drives and memory cards still <a href=\"https://www.kaspersky.com.au/blog/data-on-used-devices/28850/\">contain</a> recoverable data. This indicates that many consumers fail to wipe their devices properly before resale or disposal, but there are some simple steps you can take to keep your personal information safe while recycling responsibly.\r\n<h4><strong>The data security risks</strong></h4>\r\nDiscarded or resold electronics often retain sensitive personal and corporate information. Simply deleting files or performing a factory reset may not be sufficient. Data can often be easily <a href=\"https://ieeexplore.ieee.org/document/9763996\">recovered</a> using specialised tools. This oversight has led to alarming incidents of data leaks and breaches.\r\n\r\nFor example, 42% of used storage devices sold on eBay still <a href=\"https://www.blancco.com/blancco-reveals-42-of-used-drives-sold-on-ebay-are-holding-sensitive-data/\">contained</a> sensitive data, despite sellers following methods to erase data. This included passport images, school records, and corporate documents.\r\n<div class=\"slot clear\" data-id=\"17\">\r\n<div class=\"promo\">\r\n<div class=\"lazyload-wrapper \">\r\n<div class=\"bg-gray-50 text-gray-900 rounded pt-3 pb-5 px-4 bg-gray-50 transition-colors duration-300 mb-4\">\r\n\r\nAnother 2022 study found that improperly erased internet-connected devices <a href=\"https://ieeexplore.ieee.org/document/9763996\">stored</a> private data, making them vulnerable to exploitation. European e-waste exported to Ghana also <a href=\"https://www.diva-portal.org/smash/get/diva2:1219559/FULLTEXT02\">contained</a> classified corporate and government files, exposing security risks beyond personal identity theft.\r\n\r\nA major wireless provider in the United States failed to securely <a href=\"https://www.pulse.direct/the-evolution-of-data-security-on-e-waste-are-we-keeping-up-with-the-risks/\">decommission storage devices</a>. This led to a data breach affecting 14 million customers. Similarly, in 2021, <a href=\"https://www.hipaajournal.com/healthreach-community-health-centers-reports-improper-disposal-incident-affecting-almost-117000-patients/\">improperly discarded</a> medical hard drives exposed over 100,000 confidential patient records.\r\n<h4><strong>Why standard factory resets are not enough</strong></h4>\r\nMany people believe performing a factory reset fully erases their data. But this is not always the case.\r\n\r\nAn analysis of secondhand mobile devices found that 35% still <a href=\"https://securis.com/news/is-your-smartphone-data-safe-after-a-factory-reset/\">contained</a> recoverable data after being reset and resold. This highlights the risks of relying solely on factory resets.\r\n\r\nOn older devices or those without encryption, residual data can still be recovered using forensic tools. iPhones use hardware encryption, making resets more effective, while Android devices vary by manufacturer.\r\n<h4><strong>Best practices for secure disposal</strong></h4>\r\nTo protect your personal and organisational information, consider these measures before disposing of old devices:\r\n\r\n<strong>Data wiping</strong>\r\n\r\nPersonal users should use <a href=\"https://www.lifewire.com/free-data-destruction-software-programs-2626174\">data-wiping software</a> to securely erase their hard drive before selling or <a href=\"https://www.dailymaverick.co.za/article/2023-10-18-there-are-good-reasons-for-recycling-that-old-vape-or-iphone-lying-in-your-drawer/\">recycling a device</a>.\r\n\r\nHowever, for solid-state drives, traditional wiping methods may not be effective. This is because solid-state drives store data using flash memory and algorithms, which prolong a device’s lifespan by distributing data across memory cells and can prevent direct overwriting.\r\n\r\nInstead, enabling full-disk encryption with software such as <a href=\"https://support.microsoft.com/en-au/windows/device-encryption-in-windows-cf7e2b6f-3e70-4882-9532-18633605b7df\">BitLocker</a> on Windows or <a href=\"https://support.apple.com/en-au/guide/mac-help/mh11785/mac\">FileVault</a> on Mac before resetting the device can help to ensure data is unreadable.\r\n\r\nOn Android phones, apps such as <a href=\"https://play.google.com/store/apps/details?id=com.palmtronix.shreddit.v1&hl=en_AU\">Shreddit</a> provide secure data-wiping options. iPhones already encrypt data by default, making a full reset the most effective way to erase information.\r\n\r\nBusinesses that handle customer data, financial records or intellectual property must comply with data protection regulations. They could use certified data-wiping tools that meet the United States National Institute of Standards and Technology’s <a href=\"https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=50819\">guidelines</a> for media sanitisation or the US Institute of Electrical and Electronics Engineers’ <a href=\"https://standards.ieee.org/ieee/2883/10277/\">standard for sanitising storage</a>. These guidelines are globally recognised.\r\n\r\nMany companies also choose third-party data destruction services to verify compliance and enhance security.\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-2705156\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2025/05/Dban11.png\" alt=\"Darik’s Boot and Nuke, also known as DBAN, is a computer program designed to permanently erase data. Photo: Darik Horn/Wikimedia\" width=\"722\" height=\"402\" /> Darik’s Boot and Nuke, also known as DBAN, is a computer program designed to permanently erase data. Photo: Darik Horn/Wikimedia</p>\r\n\r\n<strong>Physical destruction</strong>\r\n\r\nIf the data is highly sensitive, physically destroying the storage medium (such as a hard drive) is the most secure option. Common <a href=\"https://datadestruction.com/top-5-hard-drive-destruction-methods-actually-work/\">methods</a> include degaussing (using a strong magnetic field), shredding, disintegration, melting, and drilling.\r\n\r\nHowever, some of these techniques can be hazardous if not handled by professionals. They also make a hard drive or device unsuitable for resale and instead require it to be taken to a waste recovery centre so the rare earth metal components can be recovered.\r\n\r\n<strong>Certified recycling services</strong>\r\n\r\nUse reputable<a href=\"https://www.dailymaverick.co.za/article/2024-07-17-electronic-waste-how-to-deal-with-an-escalating-problem/\"> e-waste</a> recyclers who adhere to strict data destruction protocols to ensure your information does not fall into the wrong hands. Look for <a href=\"https://www.re-source.au/blog/questions-to-ask-business-e-waste-recycler\">certifications</a> such as R2, e-Stewards, or AS/NZS 5377, which ensure compliance with industry security standards. An <a href=\"https://sustainableelectronics.org/find-an-r2-certified-facility/\">online database</a> run by the sustainable electronics organisation SERI of R2-certified facilities around the world can help with this.\r\n\r\n<strong>Safe selling and donating practices</strong>\r\n\r\nBefore selling or donating devices, conduct a thorough data wipe. Be cautious of devices linked to cloud accounts, and remove all personal information to prevent unauthorised access. Resetting alone may not be enough.\r\n\r\n<strong>Legal and regulatory considerations for businesses</strong>\r\n\r\nDifferent regions have strict data-protection laws that impose legal and financial penalties for improper disposal of sensitive data.\r\n\r\nIt’s important for businesses to consider the legal standards for handling and disposing personal information in whatever region they’re operating in, whether that be <a href=\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\">Europe</a>, <a href=\"https://www.ecfr.gov/current/title-16/chapter-I/subchapter-F/part-682\">the United States</a>, <a href=\"https://www.aph.gov.au/Parliamentary_Business/Bills_LEGislation/Bills_Search_Results/Result?bId=r7249#:%7E:text=Amends%20the:%20Privacy%20Act%201988,known%20as%20'doxxing'\">Australia</a> or elsewhere.\r\n<div class=\"grid-ten large-grid-nine grid-last content-body content entry-content instapaper_body inline-promos\">\r\n\r\nBefore recycling or selling an old device, take the necessary steps to ensure your data is completely erased. Identity theft, financial fraud and data breaches are real risks. But they can be prevented with the right precautions. A few extra steps now can protect your information and ensure responsible recycling. <strong>DM <iframe style=\"border: none !important;\" src=\"https://counter.theconversation.com/content/251613/count.gif?distributor=republish-lightbox-advanced\" width=\"1\" height=\"1\"></iframe></strong>\r\n\r\n<a href=\"https://theconversation.com/selling-your-old-laptop-or-phone-you-might-be-handing-over-your-data-too-251613\"><em>This story was first published in</em> The Conversation</a>. <em>Ritesh Chugh is an Associate Professor in Information and Communications Technology at CQUniversity Australia.</em>\r\n\r\n</div>\r\n<figure class=\"align-center \"></figure>\r\n<figure class=\"align-center zoomable\"></figure>\r\n</div>\r\n</div>\r\n</div>\r\n</div>",
"teaser": "Selling your old laptop or phone? You might be handing over your data too",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "1122606",
"name": "Ritesh Chugh",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/ritesh-chugh/",
"editorialName": "ritesh-chugh",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "6093",
"name": "Technology",
"url": "https://staging.dailymaverick.co.za/keyword/technology/",
"slug": "technology",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Technology",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "19394",
"name": "Encryption",
"url": "https://staging.dailymaverick.co.za/keyword/encryption/",
"slug": "encryption",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Encryption",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "360184",
"name": "data breaches",
"url": "https://staging.dailymaverick.co.za/keyword/data-breaches/",
"slug": "data-breaches",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "data breaches",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "403561",
"name": "Live Smarter",
"url": "https://staging.dailymaverick.co.za/keyword/live-smarter/",
"slug": "live-smarter",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Live Smarter",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "410806",
"name": "e-waste",
"url": "https://staging.dailymaverick.co.za/keyword/ewaste/",
"slug": "ewaste",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "e-waste",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "433380",
"name": "recyling",
"url": "https://staging.dailymaverick.co.za/keyword/recyling/",
"slug": "recyling",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "recyling",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "433381",
"name": "factory reset",
"url": "https://staging.dailymaverick.co.za/keyword/factory-reset/",
"slug": "factory-reset",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "factory reset",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "433382",
"name": "cyversecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cyversecurity/",
"slug": "cyversecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyversecurity",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "20867",
"name": "Darik’s Boot and Nuke, also known as DBAN, is a computer program designed to permanently erase data. Photo: Darik Horn/Wikimedia",
"description": "You’re about to recycle your laptop or your phone, so you delete all your photos and personal files. Maybe you even reset the device to factory settings.\r\n\r\nYou probably think your sensitive data is now safe. But there is more to be done: hackers may still be able to retrieve passwords, documents or bank details, even after a reset. In fact, 90% of second-hand laptops, hard drives and memory cards still <a href=\"https://www.kaspersky.com.au/blog/data-on-used-devices/28850/\">contain</a> recoverable data. This indicates that many consumers fail to wipe their devices properly before resale or disposal, but there are some simple steps you can take to keep your personal information safe while recycling responsibly.\r\n<h4><strong>The data security risks</strong></h4>\r\nDiscarded or resold electronics often retain sensitive personal and corporate information. Simply deleting files or performing a factory reset may not be sufficient. Data can often be easily <a href=\"https://ieeexplore.ieee.org/document/9763996\">recovered</a> using specialised tools. This oversight has led to alarming incidents of data leaks and breaches.\r\n\r\nFor example, 42% of used storage devices sold on eBay still <a href=\"https://www.blancco.com/blancco-reveals-42-of-used-drives-sold-on-ebay-are-holding-sensitive-data/\">contained</a> sensitive data, despite sellers following methods to erase data. This included passport images, school records, and corporate documents.\r\n<div class=\"slot clear\" data-id=\"17\">\r\n<div class=\"promo\">\r\n<div class=\"lazyload-wrapper \">\r\n<div class=\"bg-gray-50 text-gray-900 rounded pt-3 pb-5 px-4 bg-gray-50 transition-colors duration-300 mb-4\">\r\n\r\nAnother 2022 study found that improperly erased internet-connected devices <a href=\"https://ieeexplore.ieee.org/document/9763996\">stored</a> private data, making them vulnerable to exploitation. European e-waste exported to Ghana also <a href=\"https://www.diva-portal.org/smash/get/diva2:1219559/FULLTEXT02\">contained</a> classified corporate and government files, exposing security risks beyond personal identity theft.\r\n\r\nA major wireless provider in the United States failed to securely <a href=\"https://www.pulse.direct/the-evolution-of-data-security-on-e-waste-are-we-keeping-up-with-the-risks/\">decommission storage devices</a>. This led to a data breach affecting 14 million customers. Similarly, in 2021, <a href=\"https://www.hipaajournal.com/healthreach-community-health-centers-reports-improper-disposal-incident-affecting-almost-117000-patients/\">improperly discarded</a> medical hard drives exposed over 100,000 confidential patient records.\r\n<h4><strong>Why standard factory resets are not enough</strong></h4>\r\nMany people believe performing a factory reset fully erases their data. But this is not always the case.\r\n\r\nAn analysis of secondhand mobile devices found that 35% still <a href=\"https://securis.com/news/is-your-smartphone-data-safe-after-a-factory-reset/\">contained</a> recoverable data after being reset and resold. This highlights the risks of relying solely on factory resets.\r\n\r\nOn older devices or those without encryption, residual data can still be recovered using forensic tools. iPhones use hardware encryption, making resets more effective, while Android devices vary by manufacturer.\r\n<h4><strong>Best practices for secure disposal</strong></h4>\r\nTo protect your personal and organisational information, consider these measures before disposing of old devices:\r\n\r\n<strong>Data wiping</strong>\r\n\r\nPersonal users should use <a href=\"https://www.lifewire.com/free-data-destruction-software-programs-2626174\">data-wiping software</a> to securely erase their hard drive before selling or <a href=\"https://www.dailymaverick.co.za/article/2023-10-18-there-are-good-reasons-for-recycling-that-old-vape-or-iphone-lying-in-your-drawer/\">recycling a device</a>.\r\n\r\nHowever, for solid-state drives, traditional wiping methods may not be effective. This is because solid-state drives store data using flash memory and algorithms, which prolong a device’s lifespan by distributing data across memory cells and can prevent direct overwriting.\r\n\r\nInstead, enabling full-disk encryption with software such as <a href=\"https://support.microsoft.com/en-au/windows/device-encryption-in-windows-cf7e2b6f-3e70-4882-9532-18633605b7df\">BitLocker</a> on Windows or <a href=\"https://support.apple.com/en-au/guide/mac-help/mh11785/mac\">FileVault</a> on Mac before resetting the device can help to ensure data is unreadable.\r\n\r\nOn Android phones, apps such as <a href=\"https://play.google.com/store/apps/details?id=com.palmtronix.shreddit.v1&hl=en_AU\">Shreddit</a> provide secure data-wiping options. iPhones already encrypt data by default, making a full reset the most effective way to erase information.\r\n\r\nBusinesses that handle customer data, financial records or intellectual property must comply with data protection regulations. They could use certified data-wiping tools that meet the United States National Institute of Standards and Technology’s <a href=\"https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=50819\">guidelines</a> for media sanitisation or the US Institute of Electrical and Electronics Engineers’ <a href=\"https://standards.ieee.org/ieee/2883/10277/\">standard for sanitising storage</a>. These guidelines are globally recognised.\r\n\r\nMany companies also choose third-party data destruction services to verify compliance and enhance security.\r\n\r\n[caption id=\"attachment_2705156\" align=\"alignnone\" width=\"722\"]<img class=\"size-full wp-image-2705156\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2025/05/Dban11.png\" alt=\"Darik’s Boot and Nuke, also known as DBAN, is a computer program designed to permanently erase data. Photo: Darik Horn/Wikimedia\" width=\"722\" height=\"402\" /> Darik’s Boot and Nuke, also known as DBAN, is a computer program designed to permanently erase data. Photo: Darik Horn/Wikimedia[/caption]\r\n\r\n<strong>Physical destruction</strong>\r\n\r\nIf the data is highly sensitive, physically destroying the storage medium (such as a hard drive) is the most secure option. Common <a href=\"https://datadestruction.com/top-5-hard-drive-destruction-methods-actually-work/\">methods</a> include degaussing (using a strong magnetic field), shredding, disintegration, melting, and drilling.\r\n\r\nHowever, some of these techniques can be hazardous if not handled by professionals. They also make a hard drive or device unsuitable for resale and instead require it to be taken to a waste recovery centre so the rare earth metal components can be recovered.\r\n\r\n<strong>Certified recycling services</strong>\r\n\r\nUse reputable<a href=\"https://www.dailymaverick.co.za/article/2024-07-17-electronic-waste-how-to-deal-with-an-escalating-problem/\"> e-waste</a> recyclers who adhere to strict data destruction protocols to ensure your information does not fall into the wrong hands. Look for <a href=\"https://www.re-source.au/blog/questions-to-ask-business-e-waste-recycler\">certifications</a> such as R2, e-Stewards, or AS/NZS 5377, which ensure compliance with industry security standards. An <a href=\"https://sustainableelectronics.org/find-an-r2-certified-facility/\">online database</a> run by the sustainable electronics organisation SERI of R2-certified facilities around the world can help with this.\r\n\r\n<strong>Safe selling and donating practices</strong>\r\n\r\nBefore selling or donating devices, conduct a thorough data wipe. Be cautious of devices linked to cloud accounts, and remove all personal information to prevent unauthorised access. Resetting alone may not be enough.\r\n\r\n<strong>Legal and regulatory considerations for businesses</strong>\r\n\r\nDifferent regions have strict data-protection laws that impose legal and financial penalties for improper disposal of sensitive data.\r\n\r\nIt’s important for businesses to consider the legal standards for handling and disposing personal information in whatever region they’re operating in, whether that be <a href=\"https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679\">Europe</a>, <a href=\"https://www.ecfr.gov/current/title-16/chapter-I/subchapter-F/part-682\">the United States</a>, <a href=\"https://www.aph.gov.au/Parliamentary_Business/Bills_LEGislation/Bills_Search_Results/Result?bId=r7249#:%7E:text=Amends%20the:%20Privacy%20Act%201988,known%20as%20'doxxing'\">Australia</a> or elsewhere.\r\n<div class=\"grid-ten large-grid-nine grid-last content-body content entry-content instapaper_body inline-promos\">\r\n\r\nBefore recycling or selling an old device, take the necessary steps to ensure your data is completely erased. Identity theft, financial fraud and data breaches are real risks. But they can be prevented with the right precautions. A few extra steps now can protect your information and ensure responsible recycling. <strong>DM <iframe style=\"border: none !important;\" src=\"https://counter.theconversation.com/content/251613/count.gif?distributor=republish-lightbox-advanced\" width=\"1\" height=\"1\"></iframe></strong>\r\n\r\n<a href=\"https://theconversation.com/selling-your-old-laptop-or-phone-you-might-be-handing-over-your-data-too-251613\"><em>This story was first published in</em> The Conversation</a>. <em>Ritesh Chugh is an Associate Professor in Information and Communications Technology at CQUniversity Australia.</em>\r\n\r\n</div>\r\n<figure class=\"align-center \"></figure>\r\n<figure class=\"align-center zoomable\"></figure>\r\n</div>\r\n</div>\r\n</div>\r\n</div>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/yjXCgEI00WwiGQEDNBPYllTj2JA=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/CFsnbj7qnR-9PcQPpdH-CZv1S-k=/450x0/smart/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/blI-GvMLQ-idALG2I1oNbpal6rg=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/G6qbH3psplwH_T7ez-o2d4AHM34=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/CgBRHCpZHvTW4Y3jcFOiVeUqQ7w=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/yjXCgEI00WwiGQEDNBPYllTj2JA=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/CFsnbj7qnR-9PcQPpdH-CZv1S-k=/450x0/smart/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/blI-GvMLQ-idALG2I1oNbpal6rg=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/G6qbH3psplwH_T7ez-o2d4AHM34=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/CgBRHCpZHvTW4Y3jcFOiVeUqQ7w=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2025/05/GettyImages-478214644.jpg",
"type": "image"
}
],
"summary": "There are some simple steps you can take to keep your personal information safe.\r\n\r\n",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Selling your old laptop or phone? You might be handing over your data too",
"search_description": "You’re about to recycle your laptop or your phone, so you delete all your photos and personal files. Maybe you even reset the device to factory settings.\r\n\r\nYou probably think your sensitive data is n",
"social_title": "Selling your old laptop or phone? You might be handing over your data too",
"social_description": "You’re about to recycle your laptop or your phone, so you delete all your photos and personal files. Maybe you even reset the device to factory settings.\r\n\r\nYou probably think your sensitive data is n",
"social_image": ""
},
"cached": true,
"access_allowed": true
}