Understanding Data Security

OK, so maintaining the security and safety of your data must be your primary concern. For example: when going for long walks, cruising over Loch Ness or selling your phone on eBay. If it isn't, what are you thinking? Is that nessie?! 

When making a repair, Rockt Science contractually ensures that the your private information will not be shared in any way (which is good to know!)

Ultimately this is the right thing to do but it also gives you peace of mind that your sensitive information is safe.

Computer / Laptop Data:

When working with hardware destined for a new user, previous user data must be erased entirely. If user data isn't wiped properly, it may be accessible even after a new operating system is installed.

Consider this: computer data operates like the information in a textbook. Every file is listed in the book's index. If you tear out the index, the information in the book doesn't go away. It just makes it harder to find. Re-installing an operating system works the same way: only the index is destroyed.

Proper hard disk wiping goes further than just deleting the index. Every bit of information on the disk is overwritten, turning readable binary sequences into nonsense. To continue with the book example, proper hard disk wiping would be like turning every letter in the book into an X. Now, not only has the index been discarded, but the actual text has been rendered meaningless.

What about Smartphone and Tablet Data?:

Wiping user data from a smartphone or tablet works slightly differently. The basic mechanics are the same: deleting a file erases the indexed file path but not the content. Private user data can be found after the file is deleted. The difference is that many smartphones and tablets are encrypted.

When erasing data from an encrypted device, a technician needs only to destroy the key code that makes the data usable. Once the key is destroyed, all data will be unreadable, even though it hasn't been overwritten.

Easy solutions for entirely overwriting the contents of smartphones and tablets aren't available. Many smartphones and tablets may be "factory reset" or "hard reset." This process erases all user data by destroying the encryption key. If the device is encrypted, use the following methods:


  • Settings > General > Reset
  • Since iOS 8, encryption is default.


Menu > Settings > Privacy > Factory Data Reset

  • KitKat is not encrypted by default
  • Lollipop is not encrypted by default

Services at RocktScience:

We do all types of Malware, spyware and virus removals - we can also check the health of your PC or laptop's hard disk or storage medium. Get in contact if your having any trouble related to the above - I'll be happy to help! Get in touch here.