Published February 10, 2026 | Version v1
Video/Audio Open

Ep. 564: Beyond the Factory Reset: How to Truly Erase Your Data

  • 1. My Weird Prompts
  • 2. Google DeepMind
  • 3. Resemble AI

Description

Episode summary: In this episode of My Weird Prompts, Herman and Corn dive into the hidden risks of recycling old tech and explain why a simple "delete" is rarely the end of the story. They break down the evolution of storage, from the mechanical platters of the 2000s to the sophisticated encryption of modern smartphones and SSDs. Whether you are selling an old laptop or wondering if you should take a drill to a dead hard drive, this guide provides the essential steps to ensure your private photos, bank statements, and identity remain permanently out of reach.

Show Notes

In the latest episode of *My Weird Prompts*, hosts and brothers Herman and Corn sit down in their Jerusalem living room to tackle a common but often misunderstood dilemma: how to properly dispose of old electronics without handing over a goldmine of personal data to strangers. The discussion was sparked by their housemate Daniel, who found himself staring at a box of decade-old laptops and phones, wondering if a simple factory reset would be enough to protect his legacy of photos and financial documents.

### The Library Analogy: Why "Delete" Doesn't Mean "Gone"

Herman, the resident tech expert with a self-professed surplus of encrypted hard drives, begins by debunking the "physical document" myth of digital data. Most users assume that deleting a file is like throwing a paper in the trash, but Herman argues that digital data is far more "ghost-like."

To explain this, he uses the "Library Analogy." Imagine a massive library with millions of books. When you delete a file on a traditional Hard Disk Drive (HDD), you aren't burning the book; you are simply ripping the index card out of the card catalog. The book—the data—remains on the shelf. The operating system simply marks that space as "available." Until a new "book" is written directly over that spot, the original data remains perfectly readable to anyone with basic recovery software.

This led to the "mythos" of data destruction in the 1990s, such as the Gutmann method, which suggested overwriting a drive 35 times to remove magnetic traces. While Herman notes this was likely overkill even then, it highlights how difficult it used to be to ensure data was truly gone from mechanical, spinning platters.

### The Rise of Flash Storage and the Cryptographic Erase

The conversation then shifts to modern hardware. Most devices today—smartphones, tablets, and newer laptops—use Solid State Drives (SSDs) or flash memory. Herman explains that the rules for these devices are fundamentally different thanks to default encryption.

On a modern iPhone or Android device, data is scrambled into "gibberish" the moment it is written. The "key" to translate that gibberish is stored in a dedicated, highly secure hardware component like Apple's Secure Enclave. When a user performs a factory reset on these devices, the phone doesn't spend hours overwriting every byte of data. Instead, it performs a "cryptographic erase." It destroys the encryption key.

Herman likens this to a safe built into a mountain. If you melt the only key in a furnace, the safe's contents are effectively lost forever, even if the safe itself remains. For modern mobile users, this makes the factory reset an incredibly powerful and secure tool.

### The Windows and Mac Divide

However, the brothers warn that laptops are a bit more complicated. While modern Macs with T2 or M-series chips function much like iPhones, Windows machines can be a "wild west" of security settings. Herman points out that many older Windows 10 or 11 laptops—especially those running "Home" editions—may not have BitLocker encryption turned on by default.

If a user resets a non-encrypted Windows laptop using the standard settings, their "plain text" files might still be sitting on the drive. For these users, Herman recommends selecting the "Fully clean the drive" option during the Windows reset process. While it takes significantly longer, it ensures the drive is overwritten with zeroes, making recovery much more difficult for the average buyer.

### The Danger of Old Habits: SSDs vs. DBAN

One of the most critical warnings Herman issues involves the use of legacy wiping tools on modern hardware. Many tech-savvy users still rely on tools like DBAN (Darik's Boot and Nuke), which were designed to hammer mechanical drives with random data.

Herman explains that using these on an SSD is not only inefficient but potentially ineffective due to "wear leveling." To extend the life of a flash chip, the drive's internal controller constantly moves data around to ensure no single cell wears out too quickly. This means a software tool might think it has overwritten the entire drive, while the controller has actually hidden original data in "over-provisioned" blocks that the software can't see.

For SSDs, Herman's advice is clear: use the manufacturer's own utility (such as those from Samsung or Western Digital) to trigger a "Secure Erase" or "Sanitize" command. This tells the controller to flush the cells at a hardware level using a specific voltage spike, ensuring total data clearance.

### The Final Resort: Physical Destruction

The episode concludes with a look at "dead" tech. If a laptop won't turn on, you can't run a secure erase, but that doesn't mean the data is dead. The storage chips are likely still functional and could be harvested.

For devices that are truly junk and destined for the recycling bin, Herman advocates for the "gold standard" of home security: physical destruction. For old HDDs, this means using a power drill to put several holes through the internal platters. For SSDs, it requires a bit more precision; one must locate the individual memory chips on the circuit board and ensure they are physically cracked or crushed.

Ultimately, Herman and Corn's discussion serves as a reminder that identity theft is a "game of pieces." A single discarded drive might contain a forgotten tax return, a browser cache of passwords, or a scan of an ID. By understanding the difference between the "index card" and the "book," and by leveraging modern encryption tools like FileVault and BitLocker today, users can ensure that when they finally retire their tech, their private lives stay private.

Listen online: https://myweirdprompts.com/episode/erase-old-devices-securely

Notes

My Weird Prompts is an AI-generated podcast. Episodes are produced using an automated pipeline: voice prompt → transcription → script generation → text-to-speech → audio assembly. Archived here for long-term preservation. AI CONTENT DISCLAIMER: This episode is entirely AI-generated. The script, dialogue, voices, and audio are produced by AI systems. While the pipeline includes fact-checking, content may contain errors or inaccuracies. Verify any claims independently.

Files

erase-old-devices-securely-cover.png

Files (12.9 MB)

Name Size Download all
md5:73e4081e23497c3ee79e50ee31fda632
635.8 kB Preview Download
md5:5d57cdcec742a7d6609db132b217530f
1.6 kB Preview Download
md5:22144946e8771057292a95a15b04f7d7
12.2 MB Download
md5:3b09f5b7a8b0fca90997c5a8a411789d
21.4 kB Preview Download

Additional details