Blancco Mobile Device Eraser User Manual for Version 3.1

Total Page:16

File Type:pdf, Size:1020Kb

Blancco Mobile Device Eraser User Manual for Version 3.1 Blancco Mobile Device Eraser User Manual for Version 3.1 www.blancco.com Definitions Item Explanation Android is a mobile operating system which is based on the Linux kernel and is currently being developed by Google. Android's source code is Android released by Google under open source licenses, although the majority of Android devices ultimately ship with a combination of open source and proprietary software. BMDE Blancco Mobile Device Eraser. Acronym for Basic Input/Output System. On PCs, BIOS contains all of the BIOS code required to control (for example) the keyboard, display screen and disk drives. BlackBerry OS is a proprietary mobile operating system developed by BlackBerry BlackBerry Ltd for its BlackBerry line of smartphone handheld devices. Blancco Management Console. Blancco software used to store and BMC/MC manage Blancco erasure reports. Please read the BMC manual for more information. A checksum or hash sum is a fixed-size datum computed from an arbitrary Checksum block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. The Central Regulatory Domain Agent for wireless networks. CRDA acts as the helper for communication between the core-software and UI for CRDA regulatory compliance. See http://linuxwireless.org/en/developers/Regulatory/CRDA/ for more information. Cryptographic Erase (CE) is a method to render data on a device unusable by overwriting or changing the key used to encrypt or decrypt the data. Cryptographic Erase Once the CE takes place, the data read back is effectively scrambled and, hence, unreadable, therefore equating to a type of sanitization. A factory reset is a software restore of an electronic device to its original system state by erasing all of the information stored on the device in an attempt to restore the device’s software to its original manufacturer settings. Factory Reset A factory reset does not overwrite the data on the device. This process frees disk space for use by other data. To actually erase everything requires overwriting each block of data on the medium. In electronic systems and computing, firmware is the combination of Firmware persistent memory and program code and data stored in it. Short for Hardware Against Software Piracy, It is a software protection dongle that plugs into an electrical connector on a computer and serves as HASP an electronic “key” for a piece of software. The program will run only when the dongle is plugged in. Hard Disk Drive is a data storage device used for storing digital information HDD using rapidly rotating discs with magnetic surfaces. IOMMU Input-output memory management unit. iOS is a mobile operating system developed by Apple Inc. It is distributed iOS exclusively for Apple hardware. This operating system powers the majority of the company's iDevices. 2 Blancco Mobile Device Eraser User Manual An ISO image is an archive file of an optical disc, a type of disk image, ISO image composed of the data contents of every written sector of an optical disc, including the optical disc file system. A local area network (LAN) is a computer network that interconnects LAN computers in a limited area. Operating System or OS is a set of software that manages computer hardware resources and provides common services for computer OS programs. It is a vital component of the system software; programs require an OS to function. USB Debugging Mode is a mode that can be enabled in Android before/after connecting the device directly to a computer with a USB cable. The primary function of this mode is to facilitate a connection between an USB Debugging Android device and a computer with Android SDK. See the device documentation on how to activate USB Debugging or contact the manufacturer. The Preboot eXecution Environment is an environment to boot computers PXE using a network interface independently of data storage devices or installed operating systems. SIM (Subscriber Identity Module) is an integrated circuit chip that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate SIM card subscribers on mobile telephony devices (such as mobile phones and computers). SIM cards are always used on GSM phones; for CDMA phones, they are only needed for newer LTE-capable handsets. Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface between an operating system and platform firmware. UEFI/EFI UEFI is meant to replace the Basic Input/Output System (BIOS) firmware interface, present in all IBM PC-compatible personal computers. UI, GUI Short for User Interface and Graphical User Interface. VFAT is primarily an upgrade to the file allocation table (FAT) system, and is installed as a driver on a host computer. After installation, VFAT runs in a 32-bit protected mode VCACHE cache. Unlike FAT, which restricts file VFAT names to having no more than eight characters, VFAT expanded that range to accommodate up to 255 characters. VFAT is also supported by other operating systems and is installed as a driver extension for all of them. BMDE uses VFAT. Windows Phone is a family of mobile operating systems developed by Windows Phone, WP Microsoft for smartphones. 3 Blancco Mobile Device Eraser User Manual Table of Content 1 General Information .................................................................................................................................. 8 1.1 Minimum Hardware Requirements .................................................................................................... 8 1.2 Firewall Settings .................................................................................................................................. 9 1.3 Requirements for the User ................................................................................................................. 9 1.4 Requirements for Larger Operations .................................................................................................. 9 1.4.1 USB Requirements (Required for Large Number of Concurrent Devices)................................. 9 1.5 Booting .............................................................................................................................................. 10 1.6 Other Requirements ......................................................................................................................... 10 1.7 Legal Notice ....................................................................................................................................... 10 1.8 End User License Agreement (EULA) ................................................................................................ 11 2 Installation ............................................................................................................................................... 12 2.1 End User License Agreement (EULA) ................................................................................................ 13 2.2 Permanent installation ...................................................................................................................... 13 2.2.1 Automatic Partitioning ............................................................................................................ 13 2.2.2 Manual ..................................................................................................................................... 14 2.3 Installation Complete ........................................................................................................................ 14 2.4 Pre-existing Installation .................................................................................................................... 14 2.4.1 Overwrite Installation .............................................................................................................. 15 2.4.2 Update ..................................................................................................................................... 15 2.4.3 Error/Warning states ............................................................................................................... 16 2.5 Skip Installation ................................................................................................................................. 17 3 Login ........................................................................................................................................................ 18 3.1 Menu Bar and User Creation ............................................................................................................ 18 3.2 Settings Panel .................................................................................................................................... 19 3.2.1 Set Network ............................................................................................................................. 19 WLAN ................................................................................................................................... 20 3.2.2 Set Proxy .................................................................................................................................. 20 3.2.3 Network Test ........................................................................................................................... 21 3.2.4 Set Time and Date ..................................................................................................................
Recommended publications
  • Secure Data Deletion
    Research Collection Doctoral Thesis Secure Data Deletion Author(s): Reardon, Joel Publication Date: 2014 Permanent Link: https://doi.org/10.3929/ethz-a-010411932 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library Diss. ETH No. 22475 Secure Data Deletion A thesis submitted to attain the degree of DOCTOR OF SCIENCES of ETH ZURICH (Dr. sc. ETH Zurich) presented by Joel Reardon Master of Mathematics, University of Waterloo born 31.07.1983 citizen of Canada accepted on the recommendation of Prof. Dr. Srdjan Capkun,ˇ examiner Prof. Dr. David Basin, coexaminer Prof. Dr. Ari Juels, coexaminer Prof. Dr. Paul Van Oorschot, coexaminer Dr. Alessandro Sorniotti, coexaminer 2014 Abstract Secure data deletion is the task of deleting data from a physical medium so that the data is irrecoverable. This irrecoverability is what distin- guishes secure deletion from regular deletion, which ostensibly deletes unneeded data only to reclaim resources. We securely delete data to prevent an adversary from gaining access to it, and so secure deletion is a natural part of the confidentiality of data. In this thesis, we examine secure deletion in a variety of different systems and different layers: from the hardware level of ensuring a storage medium can efficiently delete data to the system level of deleting data from unreliable and untrusted servers. We examine related work in detail, identify the deficiencies and unsolved problems, and build our own solutions to advance the state of the art.
    [Show full text]
  • Electronic Media Sanitization Standard
    Electronic Media Sanitization Background Computing systems (including desktops, laptops, tablets, networking equipment, cellular phones, smart phones and other devices) store data on a wide variety of storage media (e.g., hard drives, USB flash drives, solid-state drives, floppy disks, CD-ROM's, DVD’s, Blu-Ray’s, tapes, memory, etc.). This data must be securely removed from the media once the data and/or device is no longer required in order to prevent unauthorized disclosure of the data. This is particularly important if the device contains Export Controlled or Restricted data as defined in the Data Governance & Classification Policy. Data could be disclosed through many avenues including computers or equipment sold, recycled or disposed without appropriate media sanitization practices, equipment with storage media returned to vendors as defective or as a trade-in for new equipment, or mobile media not being properly sanitization and or destroyed after use. Standard The NIST Special Publication 800-88r1 - Guidelines for Media Sanitization is used as the primary guide for this document. NIST Special Publication 800- 88r1 explains the need for proper media sanitization, types of sanitization, roles and responsibilities and much more information related to this topic. The Electronic Media Sanitization Standard is mandatory for media that contains Export Controlled or Restricted data and is recommended for media that contains Controlled data. Export Controlled data may have additional sanitization requirements, see Export Controls Office for additional information. Each college or department must adhere to the University General Retention Schedule unless the college or department has an approved unique schedule. When Export Controlled or Restricted data has been stored on media where that media is to be reused or forwarded to UC Surplus Management for appropriate disposition, it is imperative that measures be taken to sanitize the media before it leaves control of the department of responsibility.
    [Show full text]
  • Unwanted Data
    www.osbplf.org Malpractice Prevention Education for Oregon Lawyers Unwanted Data: How to Properly Destroy Data in Hardware If you have old computers and other office Options for Permanent Data equipment in your law office or home, there is Erasure a good reason they are still with you and not in the dumpster. This article will discuss why you You have two ways to completely destroy should be concerned about the data in your de- data: (1) use specialized software to overwrite the vices and the proper way to dispose of them. data or (2) physically destroy the hard drive. Why It Matters Using Data Sanitization Software Oregon Rule of Professional Conduct 1.6(c) Specialized software tools permanently de- requires lawyers to take reasonable steps to pre- lete files from your computer by overwriting vent the inadvertent disclosure of or unauthorized the information with random data. When this access to client information. To comply with this “data sanitization” method is used, overwritten rule, you need to make sure client data stored data can never be un-deleted with a file recov- in your computer and other media aren’t com- ery tool. Software programs that permanently promised when you get rid of the devices. This delete selected files are called file shredder pro- April 2017 requires you to ensure that data stored on these grams. Software programs that completely erase Issue 131 devices cannot be reconstituted after they leave the entire hard drive, not just selected files, are your control. It’s necessary that you permanently called data destruction programs.
    [Show full text]
  • Guidelines for Media Sanitization
    NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 C O M P U T E R S E C U R I T Y NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine Computer Security Division Information Technology Laboratory This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 December 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Acting Under Secretary of Commerce for Standards and Technology and Acting Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Recommendation on Data Sanitisation and Data Medium Destruction Techniques
    Data Protection Authority Recommendation on data sanitisation and data medium destruction techniques Information media erasure and destruction guide | Version 1.01 - 23/03/2021 1 1 WARNING: This document is intended to provide additional explanation to the rules in force and does not exempt the controller from its obligations and responsibilities under the GDPR and other applicable texts. Considering its requirements and the risk analysis that it carries out or plans, it shall use one or the other tool and method, given in particular the evolution of knowledge and technologies. The different tools and brands cited in this document are cited for the sole purpose of providing examples. The Authority makes no representation as to their compliance with the GDPR and other regulations or as to their quality and performance. Information media erasure and destruction guide | Version 1.01 - 23/03/2021 2 2 TABLE OF CONTENTS Summary ............................................................................................................................................................................. 6 1. Introduction ..................................................................................................................................... 7 Limitations ................................................................................................................................................................... 9 Target audience.....................................................................................................................................................
    [Show full text]
  • Guide to Digital Privacy at the U.S. Border
    Digital Privacy at the U.S. Border PROTECTING THE DATA ON YOUR DEVICES AND IN THE CLOUD Sophia Cope, Staff Attorney Amul Kalia, Analyst Seth Schoen, Senior Staff Technologist Adam Schwartz, Senior Staff Attorney MARCH 8, 2017 ELECTRONIC FRONTIER FOUNDATION EFF.ORG 1 Table of Contents Digital Privacy at the U.S. Border.............................................................................................1 EXECUTIVE SUMMARY....................................................................................................5 PART 1: DIGITAL PRIVACY GUIDE FOR TRAVELERS...............................................9 What is the Border?..............................................................................................................9 Risk Assessment Factors.......................................................................................................9 Factors about You..............................................................................................................................9 Factors About Your Data and Devices............................................................................................10 Before You Arrive at the Border..........................................................................................11 Talk to Your Employer....................................................................................................................11 Minimize the Data Tat You Carry Across the Border..................................................................12 Protect What You Carry
    [Show full text]
  • Blancco Mobile Device Eraser
    Blancco Mobile Device Eraser The Most Comprehensive Mobile Data Eraser Solution for iOS, Android, Windows Phone and BlackBerry Operating Systems with Advanced Diagnostics for iOS and Android Securely and effectively erase sensitive data on mobile Why Blancco devices to achieve data sanitization and compliance. Blancco Mobile Device Eraser allows organizations, mobile service providers, As the de facto standard mobile device processors, warehouses, retailers and resellers to quickly diagnose device issues and permanently erase all data from smartphones and tablets in data erasure, Blancco from a single solution. Available for iOS, Android, Windows Phone and BlackBerry provides thousands of operating systems, our solution verifies and certifies that sensitive data can’t be exposed after the devices are disposed of, recycled, traded in or resold. organizations with an absolute line of defense against costly security breaches, as well Key Benefits as verification of regulatory Diagnose: iOS and Android device issues within minutes compliance through a 100% • Identify and resolve device performance issues with 32 iOS and 39 Android diagnostics tests tamper-proof audit trail. • Leverage real-time data and analytics to optimize the overall diagnostics Our data erasure solutions process - reducing operational costs have been tested, certified, • Maximize the resale value of second-hand devices approved and recommended Erase: in excess of 40+ iOS, Android, Windows Phone and BlackBerry devices by 18 governing bodies around • Dramatically improve
    [Show full text]
  • As a Potential Privacy Violation
    Digital Privacy at the U.S. Border PROTECTING THE DATA ON YOUR DEVICES Sophia Cope, Staff Attorney Amul Kalia, Analyst Seth Schoen, Senior Staff Technologist Adam Schwartz, Senior Staff Attorney DECEMBER 2017 ELECTRONIC FRONTIER FOUNDATION EFF.ORG 1 Table of Contents ..................................................................................................................................................1 Digital Privacy at the U.S. Border.............................................................................................1 EXECUTIVE SUMMARY.................................................................................................... PART 1: DIGITA# PRIVACY GUIDE F%R TRAVE#ERS...............................................& 'hat i( the Border)..............................................................................................................& Ri(* A((es(+ent Factor(.......................................................................................................& $actor( a-o.t Yo...............................................................................................................................& $actor( A-o.t Yo.r Data a,d Device(............................................................................................10 Before Yo. Arrive at the Border..........................................................................................11 Tal* to Yo.r Em1loyer....................................................................................................................11 Mi,i+i2e
    [Show full text]
  • Blancco Mobile
    BLANCCO MOBILE User Manual for Windows 7 (Professional, Ultimate or Enterprise) www.blancco.com TABLE OF CONTENTS Contact and Legal Information ................................................................................................. 4 Notice to Users ................................................................................................................ 4 Introduction ........................................................................................................................... 5 Overview ......................................................................................................................... 5 System Requirements ....................................................................................................... 5 Licensing ......................................................................................................................... 5 Getting Help .................................................................................................................... 6 Online Help ..................................................................................................................... 6 Technical Support ............................................................................................................ 6 Chapter 1: Installation ............................................................................................................ 7 Installing Blancco Mobile..................................................................................................
    [Show full text]
  • Blancco Mobile Device Eraser Advanced Mobile Data Erasure for Your Mobile Devices
    Blancco Mobile Device Eraser Advanced Mobile Data Erasure for your Mobile Devices Blancco Mobile Device Eraser enables organizations Why Blancco to securely and efficiently wipe any sensitive data on mobile devices to comply with the most stringent data As the de facto standard sanitization standards and achieve compliance. in data erasure, Blancco Blancco mobile and phone wiping software allows organizations, mobile service provides thousands of providers and resellers to permanently erase all data from smartphones and tablets running on iOS, Android, Windows Phone and BlackBerry operating organizations with an absolute systems. Blancco is the most comprehensive and trusted data erasure solution line of defense against costly on the market, ensuring sensitive data is not exposed after mobile devices are disposed of, recycled, traded in or resold. security breaches, as well as verification of regulatory compliance through a 100% Key Benefits tamper-proof audit trail. Fast and Effective Erasure Our data erasure solutions • Conduct high-speed erasure of up to 50 iOS, Android, Windows Phone and BlackBerry devices at once to improve processing time and productivity. have been tested, certified, • Instantaneous USB connectivity ensures you’re up and running without delay. approved and recommended 100% Tamper-Proof Erasure Certification by 18 governing bodies around • Provides a digitally signed proof of data erasure certificate for audit trail the world. No other security purposes firm can boast this level of • Compliant with state, federal and international data privacy regulations compliance with the most and guidelines, including ISO 27001 and ISO 27040. rigorous requirements set by Flexible and User-Friendly Interface government agencies, legal • Closely monitor ongoing erasure and diagnostic processes to improve authorities and independent success rate and reduce turn-around time.
    [Show full text]
  • Commonwealth of Virginia
    ITRM Standard SEC514-05 Removal of Commonwealth Data from Electronic Media Standard July 1, 2019 COMMONWEALTH OF VIRGINIA Information Technology Resource Management Standard Removal of Commonwealth Data from Electronic Media Standard Virginia Information Technologies Agency Page i ITRM Standard SEC514-05 Removal of Commonwealth Data from Electronic Media Standard July 1, 2019 ITRM Publication Version Control ITRM Publication Version Control: It is the User's responsibility to ensure they have the latest version of this ITRM publication. Questions should be directed to VITA’s Enterprise Architecture (EA) Division. EA will issue a Change Notice Alert and post on the VITA Website, provide an email announcement to the Agency Information Technology Resources (AITRs) and Information Security Officers (ISOs) at all state agencies and institutions as well as other parties PPEA considers interested in the change. This chart contains a history of this ITRM publication’s revisions. Version Date Purpose of Revision Original N/A Base Document Revision 2.1.0 10/28/2003 SEC2003-02-1 Rev 0 (10/28/2003) Revision 2.1.1 03/08/2004 Supersedes SEC2003-02-1 Rev 0 Revision 3 3/15/2008 Supersedes SEC2003-02-1 Rev 1. This revision reflects legislative changes that expanded the CIO’s information security responsibilities to include Judicial, Legislative and Independent Agencies branches of government, and Institutions of Higher Education. In addition, appendix B (Non-Disclosure Agreement) and appendix C (Data Removal Quality Assurance Form) along with several minor changes were made to reflect current industry practices and to amplify requirement statements. Also this change reflects the new numbering structure for all PSGs.
    [Show full text]
  • Analysis of Data Remanence After Factory Reset, and Sophisticated Attacks on Memory Chips
    ANALYSIS OF DATA REMANENCE AFTER FACTORY RESET, AND SOPHISTICATED ATTACKS ON MEMORY CHIPS Mariia Khramova, Sergio Martinez Blancco Technology Group Abstract: Considering the amount of data stored on smartphones, it is critical that none of the user information is retrievable in case of device resell or disposition. Data security on disposed devices is one of the key enablers for device lifetime extension and, consequently, for making electronics more sustainable. Factory Reset, being default data wipe solution offered by Android, has already been challenged by researchers from University of Cambridge back in 2015. That has been the first comprehensive study and probably one of the most recognized works on evaluation of Android Factory Reset performance. The study proved that default erasure process is failing to securely sanitize the storage on Android versions from Gingerbread to Jelly Bean (v.2.3 – 4.3). However, despite frequent updates of Android OS, there was no further research conducted to reexamine Factory Reset reliability on newer devices and OSes. Our study has brought this line of research to the new level and investigated the changes of Factory Reset effectiveness over the past years. In addition, we have evaluated the robustness of in-built Android sanitization against attacks of different degree of sophistication including chip-level data read on one of the best-selling smartphones in history Samsung Galaxy S4 (80 Million units) [1]. The results show that Android Factory Reset logical sanitization has generally improved making user data more difficult to recover. However, default erasure process is still failing to irretrievably erase the data, which allowed us to retrieve the user data directly from the NAND flash bypassing the controller.
    [Show full text]