Feeds

Giving your old Tesco Hudl to Auntie June? READ THIS FIRST

You can never wipe supermarket slab clean enough

  • alert
  • submit to reddit

Business security measures using SSL

UK supermarket Tesco’s Hudl tablet will offer up data from past users – even if it’s been factory reset.

The Register spoke to Ken Munro from security firm Pen Test Partners, who said he'd bought 17 Hudls and AllWinner tablets from eBay and found that not only does the reset process not wipe all the data, it’s possible to retrieve account details and login information.

Monro told El Reg: "The factory data reset doesn’t appear to zero all sectors on the disc; it’s simply too quick a reset process to do so."

He went on to confirm the suspicions: "So then we bought a few Tesco refurbished Hudls from the Tesco Outlet Store on eBay. Whilst two of them had been correctly zeroed using a wiping product, one was not. From this we recovered some of the previous owners personal data, again including social media and mail profiles."

He does, however, suspect this might be a one-off as Tesco has told him it does use erasing software, and it looked as though a partial wipe had been attempted.

Google’s advice is to run encryption software before resetting but Munro points out that this doesn’t work with Android 4.2.2 (Jellybean), which runs on the Hudl. There's no option in the menus and Munro points to the Rockchip CPU which powers the Hudl as that doesn't handle encryption of the user data partition.

One area which particularly worries Munro is that tablets are often put on eBay with broken screens and that these will not have been wiped at all. He points out that cheap tablets are often bought for children and by selling on a tablet which has the child’s social network data, the parent might be unwittingly aiding a stalker who could use the identity of the child to stalk other children.

Munro's fears go beyond that: "It also helps the stalker avoid a police sting – a copper would not be using a cheap tablet to sting a stalker with! They would be using a carefully managed and secured PC in a police building somewhere."

Munro is now working with Tesco, but the general advice is to use a third party tool to wipe any device before sale. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
DARPA-backed jetpack prototype built to make soldiers run faster
4 Minute Mile project hatched to speed up tired troops
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Apple's ONE LESS THING: the iPod Classic disappears
RIP 2001 – 2014. MP3 player beloved of millions. Killed by cloud
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.