easteregg
Dark background with blue accents with light reflectionsDark background with blue accents with light reflectionsDark background with blue accents with light reflections

Selling Your Old Tech?
Complete Data Erasure Guide (+ free pre-sale checklist)

Selling Your Old Tech? - Complete Data Erasure Guide (+ free pre-sale checklist)Selling Your Old Tech? - Complete Data Erasure Guide (+ free pre-sale checklist)

You would never give your house keys to a stranger. But when you sell your old laptop or hard drive, you might be doing exactly that. Here is an important fact: 45% of used devices still have personal information that anyone can see. Another 26% have data that people can find again using free software.

Your deleted family photos? They are still there. Your saved passwords? Someone can find them in minutes. Your tax papers, bank statements, and work documents? All of these can be found again. When you press "delete" or reset your device to factory settings, you are not removing anything. You are only removing the label that shows your computer where the file is. The data stays on your drive. Anyone with free recovery tools can find it.

Scientists looked at 311 used devices and they found a worrying situation. 'Deleted' photos and videos were still found on 196 devices. Identity documents were on 50 devices. Business information was on 25 devices. Banking data was on 9 devices. All of these sellers probably thought they cleaned their devices. The truth is that normal deletion methods do not really protect you.

Also, make sure to download our free computer pre-sale checklist (printable, PDF). Download it at the end of the article.

Why Normal Deletion Does Not Work

The main problem is how storage devices work. When you delete something, the device marks the space as empty. But the original information stays there until new data replaces it. Recovery software looks for data patterns that stay there long after you empty your trash. For old hard drives with spinning parts (HDDs), this means magnetic patterns stay on the disks. For SSDs (solid-state drives, the newer type), the problem is even bigger.

SSDs are different and harder to clean. Modern SSDs use a technology called wear-leveling. This spreads your data across the drive to make it last longer. SSDs also have extra space that your computer cannot see directly. Copies of your data can stay in this hidden space forever, which makes recovery even easier.

This is not just a theory. Healthcare companies get fines of $50,000 for each case when they do not clean devices properly. Small businesses have been sued when sold computers leaked customer information. Many people have had their identity stolen because of badly cleaned devices. We often do not hear about these cases because victims never realize the problem came from that laptop they sold on Ebay two years ago. But that's exactly what happens in reality.

Looking at the options: free tools and factory resets

DBAN

Free tools like DBAN (Darik's Boot and Nuke) are quite popular. DBAN uses military standards, it writes zeros, then ones, then random data over every part of the drive three times and checks the results. For old hard drives with spinning parts, this method works well. It protects against all known software that tries to recover data.

The problem? DBAN was made for old storage technology. It cannot properly clean SSDs. You will create a bootable USB drive, go through complicated startup steps, wait 12 hours or more for the process to finish, and see a "success" message. But the hidden extra space on your SSD stays completely untouched. This space can have gigabytes of your personal information. DBAN cannot reach these areas. It cannot send the proper Secure Erase command to the drive controller.

Using DBAN is also hard. Many people give up when they see command-line screens and startup menus.

Factory Reset

Windows has "Reset this PC" and Mac has "Erase All Contents and Settings." These look like complete solutions. Sadly, they are not.

On encrypted drives (BitLocker for Windows, FileVault for Mac), these tools only delete the encryption key, not the encrypted data itself. The idea seems good. Without the key, no one can read the data.

But there is a big problem. Most users automatically back up their recovery key to OneDrive, iCloud, or another cloud service - sometimes, without even knowing it. If this happens, the protection disappears. Anyone who gets into your cloud account can get the recovery key and decrypt everything. This can happen through phishing emails, data breaches, or simply knowing your password.

Even when you use full overwrite options, factory resets usually only clean the main user storage areas. The hidden SSD space, hidden partitions, and recovery partitions stay untouched. Different devices do factory resets differently. You have no good way to check what actually got erased.

The Problems People Forget

Most people getting ready to sell a computer only think about the main internal drive. But external hard drives and USB flash drives often sit in drawers, forgotten. These devices have the same risks. People often keep years of backup files on them. Simple deletion or quick formatting leaves data that can be found again.

USB flash drives are especially problematic. They are made completely of NAND flash memory chips - the same technology as in SSDs, meaning they have the same wear-leveling issue. Many USB sticks do not support secure erase commands. This makes them very hard to clean using normal tools. That 64GB flash drive you are including as a bonus when you sell your laptop? It might have more personal information that can be recovered than the laptop itself.

What is the correct Solution, then?

Hardware-Based 'Secure Erase'

For SSDs, the right way is using the ATA Secure Erase command. For NVMe drives, it is called NVMe Format. This command is built into modern SSD firmware. It works at the hardware level. When done correctly, it tells the drive's controller to apply a voltage spike to every memory cell, including the hidden areas you cannot normally access. This resets all stored data to an empty state. This is the "Clear" standard that security organizations and forensic experts recognize. It protects against all known software-based recovery techniques, and it's the best option you have.

The problem is that not all software can trigger this command correctly - it frequently is not available in some UEFI systems of older laptops and computers. Different SSD manufacturers also use secure erase with small differences. Some drives need specific preparation steps that generic tools completely miss. A failed secure erase attempt leaves your data completely intact while showing what looks like a success message.

However, again, while it is the most secure method, it sadly has several drawbacks. First, not all SSDs include this command. Second, not all laptops and computers allow you to execute this command - even if your SSD does support it. Third, the entire erasure process might be 'scary' to ordinary PC users, as it can involve booting into your computer's BIOS/UEFI, or using the Command Prompt, which most users would not be comfortable doing.

For most users, the best erasure option would be to use specialized shredding software, such as Offigneum (for Windows) or MacGlacio (for Mac). These programs were built to solve modern storage challenges, ensuring truly complete erasure. Unlike free tools designed for outdated storage technology, both Offigneum and MacGlacio use secure erase protocols that work reliably on SSDs, HDDs, USB flash drives, external drives, and even SD cards.

Unlike some other tech-savvy, outdated, or simply unsecure methods, Offigneum and MacGlacio work equally well for both cybersecurity professionals and regular users. If you consider yourself an 'ordinary PC user'—meaning you're not comfortable with BIOSes, Terminals, Command Prompts, and other intimidating aspects of your computer—Offigneum and MacGlacio provide both user-friendly interfaces and robust security. Additionally, they offer 51 erasure algorithms, which isn't just marketing hype. Different storage technologies, file systems, and security requirements demand different approaches. The proprietary Wiper technology suite (WiperTurbo, WiperPrime, WiperDeep) adapts to your specific storage type and security needs, completely automatically, ensuring 100% erasure on all your devices, every time.

External drive support is another key feature. Both programs recognize and securely clean external hard drives and USB flash drives using appropriate protocols for each device type. This prevents the common mistake of leaving backup drives containing years of personal information completely exposed.

An accessible and elegant interface is another major advantage. No command-line knowledge is required—simply drag files or folders to the program window to shred them, and everything is done in three clicks. Similarly, you can shred entire drives or only free space, which is especially useful when you want to preserve existing files while ensuring complete erasure of previously 'deleted' files that weren't securely removed.

The Real Cost of Free Tools

Offigneum and MacGlacio cost just $4.99 for a month license, and also offer 1-year ($39.99) and lifetime plan (currently discounted at just $48.99). Compare this price to what happens if your data gets exposed. Fixing identity theft takes an average of 200 hours and costs thousands of dollars. HIPAA violation fines start at $50,000. Customer data breaches cause lawsuits and penalties. Even personal embarrassment from exposed private photos or documents has a psychological cost that is much more than five dollars.

Free tools are not actually free when they fail. You spend hours learning how to use them, waiting for processes to finish, and believing you are safe. Then, a year later, you discover that you sold a device with personal information that can be recovered. The time cost alone is more than the price of specialized software. The risk cost cannot be measured.

Your Responsibility, Your Choice

The moment you hand over a device, you lose all control. It does not matter if you are selling it, donating it, recycling it, or giving it to a family member, a friend or an acquaintance. That laptop might change hands three more times before someone runs recovery software out of sheer curiosity or bad intentions. You cannot get it back. You cannot demand its return. And your 'deleted' data is still out there, even after years.

Data cleaning is not a mere suggestion or a "best practice". It is your responsibility and your protection. Your options are clear. You can spend a few dollars on proper shredding software. Or you can accept the risk that your financial records, medical information, personal photos, and saved passwords might end up in someone else's hands - sometimes, after years. One of these choices costs $4.99. The other could cost you thousands, if not everything.

Do not trust ordinary deletion. Do not trust factory resets. Use proper shredding tools, check the results, and only then let your old tech go.

Download our free pre-sale checklist (printable). This comprehensive, step-by-step guide walks you through the entire data sanitization process, ensuring no device is overlooked and your personal information is completely protected before sale or donation. Suitable for both macOS and Windows computers, this checklist covers all the critical steps you cannot afford to skip—from identifying your storage type to verifying complete data erasure.

Learn more about Offigneum and the full list of its features on its official website:
www.ambeteco.com/Offigneum/


Legal Disclaimer: The information provided in this article is for general informational purposes only and does not constitute legal or technical advice. The methods and tools described, including Offigneum file-shredding software, are intended to enhance data security and privacy. However, no data erasure method can guarantee absolute protection against data recovery, due to many factors, including user error, improper handling of storage media, and external environmental influences. Users should exercise caution and consult a professional if unsure about data deletion processes. Offigneum and its developers disclaim any liability for damages or losses arising from the use or inability to use the described tools or techniques or instructions. For specific legal and technical concerns, please seek appropriate professional guidance.

FAQ about Selling Your Old Tech?

Question

Is factory reset enough to wipe data before selling a laptop?

Answer

No, a standard factory reset is not enough to securely wipe your data before selling. When you perform a factory reset, Windows or macOS removes the pointers to your files and reinstalls the operating system, but the actual data remains on the drive and can be recovered using free or low-cost recovery software. To be truly safe, you need to use secure erase software that overwrites your data or sends an ATA Secure Erase command directly to the drive's firmware. On Windows, selecting 'Remove everything' and enabling 'Clean data' in the reset settings provides more protection than a basic reset, but dedicated file shredding software like Offigneum (Windows) or MacGlacio (Mac) is the most reliable option for ensuring your data is unrecoverable.

Question

Can deleted files be recovered after selling a computer?

Answer

Yes — deleted files can very often be recovered after a computer is sold if the drive was not properly wiped. When you delete a file or empty the Recycle Bin, the operating system only removes the reference to that file. The actual data stays on the drive until it is physically overwritten by new data. Free recovery tools available online can restore deleted files, photos, documents, and even saved passwords in minutes. Studies of secondhand drives purchased on eBay and other marketplaces have found that a majority still contained recoverable personal data, including tax records, passport scans, and banking documents. Using dedicated data shredding software before selling ensures files are permanently overwritten and cannot be retrieved.

Question

How do I securely wipe an SSD before selling?

Answer

Securely wiping an SSD requires different methods than wiping a traditional hard drive. Because SSDs use wear-leveling technology, standard overwrite tools do not fully erase data — copies can remain in hidden over-provisioned areas the operating system cannot directly access. The most effective method is issuing an ATA Secure Erase (for SATA SSDs) or NVMe Format command, which instructs the drive's controller to reset every memory cell to factory state, including hidden areas. This can be done through your BIOS/UEFI if supported, through your SSD manufacturer's utility, or through specialized software such as Offigneum (Windows) or MacGlacio (Mac), which automates this process for both technical and non-technical users. Simply formatting or factory resetting is not sufficient for SSDs.

Question

Does DBAN work on SSDs?

Answer

No, DBAN (Darik's Boot and Nuke) does not work properly on SSDs and should not be used to wipe them. DBAN was designed for traditional spinning hard drives (HDDs) and works by overwriting sectors multiple times. However, SSDs use wear-leveling and over-provisioning, meaning the drive's controller distributes writes across hidden physical cells that DBAN cannot access. Even after DBAN reports a successful wipe, gigabytes of personal data can remain in the SSD's hidden over-provisioned areas completely untouched. For SSDs, you need software that can send a hardware-level Secure Erase command to the drive's firmware, or specialized shredding software built for modern storage technology. DBAN remains a valid option for wiping old-style HDDs only.

Question

What personal data is at risk when selling an old computer?

Answer

When selling a computer without properly wiping it, a wide range of sensitive personal data can be at risk. Studies of used devices have found recoverable family photos and videos, identity documents, banking information, saved browser passwords, tax records, medical information, work documents, and email history. Because most people only delete files or perform a factory reset — neither of which permanently destroys data — the information remains on the drive and can be accessed with freely available recovery tools. Even data you never consciously saved, such as browser autofill entries, cached web pages, and cloud account tokens, can be recovered. Proper data shredding software is necessary to ensure none of this information survives on the device before it changes hands.

Question

How do I wipe a USB flash drive or external hard drive before selling?

Answer

USB flash drives and external hard drives require the same careful treatment as your computer's main drive before selling. Both device types use NAND flash memory with wear-leveling, meaning standard deletion and quick formatting leave data recoverable. Many USB sticks also do not support Secure Erase commands, making them particularly difficult to clean with generic tools. The safest approach is to use dedicated shredding software that supports external storage — such as Offigneum for Windows or MacGlacio for Mac — which applies appropriate erasure protocols for each device type. This is important because many people include old USB drives as a 'bonus' when selling a laptop, not realizing these small drives can contain years of personal backup data that is trivially easy to recover.

Question

What is the difference between deleting files and shredding files?

Answer

Deleting files — including emptying your Recycle Bin or performing a quick format — only removes the file system entry that points to your data. The actual data remains on the drive, intact, until new data happens to overwrite it. Anyone with free recovery software can find and restore it in minutes. File shredding, by contrast, actively overwrites the physical storage space where a file lived with random patterns of data, making it impossible to reconstruct the original. Professional shredding tools like Offigneum and MacGlacio apply multiple overwrite passes using recognized security algorithms, and for SSDs they issue hardware-level Secure Erase commands that reset every memory cell including hidden areas. When you sell a device, shredding is the only method that gives you confidence your personal information is truly gone.

Question

Is it safe to sell a laptop with BitLocker or FileVault encryption enabled?

Answer

Encryption alone is not a reliable substitute for proper data wiping before selling a laptop. While BitLocker (Windows) and FileVault (Mac) encrypt your data so that it is unreadable without the decryption key, a factory reset using these tools only deletes the encryption key — not the encrypted data itself. The encrypted data remains on the drive. The critical risk is that most users back up their BitLocker recovery key to OneDrive or their FileVault key to iCloud, sometimes without realizing it. If someone gains access to your cloud account through a phishing attack, data breach, or password guess, they can retrieve that recovery key and decrypt all your data from the drive. Using dedicated shredding software to fully overwrite the drive eliminates this risk entirely.

Question

How can I verify my hard drive has been wiped successfully?

Answer

After wiping a drive, there are several ways to verify the erasure was complete. You can run free data recovery software like Recuva and attempt to recover files — if nothing comes back, or only unreadable fragments appear, the wipe was successful. Some professional shredding tools like Offigneum provide an erasure report or log confirming the process completed correctly across all drive sectors. For SSDs specifically, it is worth checking whether your shredding software explicitly supports Secure Erase commands and confirms they were successfully sent to the drive's controller, since a 'success' message from software that does not support hardware-level SSD erasure can be misleading. If you want an extra layer of confidence, encrypting the drive before wiping means any fragments that survive are unreadable without the discarded key.

Question

What happens if I sell a computer without wiping the data?

Answer

Selling a computer without properly wiping the data puts you at serious risk of identity theft, financial fraud, and privacy violations. Studies show that 45% of used devices still contain visible personal information and another 26% contain data recoverable with free software. Anyone who buys your device — or anyone they sell it to — could use widely available recovery tools to find your tax returns, banking records, saved passwords, personal photos, and work documents. The consequences can include identity theft (which takes an average of 200 hours and thousands of dollars to resolve), unauthorized access to your financial and social media accounts, and exposure of confidential work information that could create legal liability. For businesses, failure to wipe devices properly can trigger HIPAA or data protection fines starting at $50,000 per incident. The risk does not disappear quickly — recovery is possible even years after a device changes hands.

Offigneum

World's most powerful shredder