Android IMEI Access Restrictions and How MASAMUNE Erasure Handles Them

In recent years, teams working with Android device sanitization have increasingly encountered cases where the IMEI (International Mobile Equipment Identity) cannot be retrieved automatically. This is typically not a single-device anomaly, but the result of Android privacy changes and OEM-specific security hardening.

1. Android 10 (API 29) and later: tighter access to non-resettable identifiers

Starting with Android 10, access to non-resettable device identifiers (such as IMEI and serial numbers) has been restricted as part of Android’s privacy protections. In many cases, IMEI access is no longer available to regular applications and may require privileged/system-level capabilities.

Reference: AOSP “Device identifiers”: https://source.android.com/docs/core/connect/device-identifiers

2. Why ADB / service call approaches are increasingly unreliable

Some environments historically used ADB shell commands or internal service calls (e.g., service call iphonesubinfo) to retrieve IMEI. However, these paths are unofficial and unstable, and behavior can vary by Android version, security patch level, and OEM implementation. As a result, newer builds more often return empty results or errors.

3. OEM-specific debugging/security settings

Some OEMs and Android variants (e.g., MIUI/HyperOS) add additional security toggles beyond standard “USB debugging,” which can restrict what can be accessed via ADB. In practice, missing one of these settings may lead to incomplete device information retrieval.

4. Practical summary

  • On Android 10+, automatic IMEI retrieval is generally harder by design
  • ADB/internal commands are device/build-dependent and not guaranteed
  • OEM settings can affect the workflow significantly

5. How MASAMUNE Erasure addresses this reality

MASAMUNE Erasure is designed so that sanitization work can proceed even when automatic IMEI retrieval is limited by platform policy. We continuously maintain compatibility with newer Android versions and devices, and provide operational guidance for common on-site issues.

We recommend confirming USB debugging, any OEM-specific security toggles, on-screen authorization prompts, and using the latest version of MASAMUNE Erasure.

6. Notes

On non-root, standard ADB environments, automatic IMEI retrieval can be significantly restricted by design, and manual input may be required depending on the device and OS build. While some privileged configurations may allow access, this should not be assumed in general operations.


Contact: If you need guidance for your device mix and operational environment, please contact our support team.

投稿 Android IMEI Access Restrictions and How MASAMUNE Erasure Handles ThemMASAMUNE に最初に表示されました。

Update: iPhone 8 / 8 Plus Firmware Handling

Dear Customers,

We have released an update for MASAMUNE Erasure related to iPhone 8 / iPhone 8 Plus firmware handling.

We identified a change in part of the IPSW structure for iPhone 8 / 8 Plus. The update improves handling of this change and has been verified on real devices.

No manual action is required. MASAMUNE Erasure will apply the update automatically on startup.

Thank you for your continued support of MASAMUNE Erasure.

投稿 Update: iPhone 8 / 8 Plus Firmware HandlingMASAMUNE Erasure に最初に表示されました。

Notice: Potential Erasure Errors on iOS 18

Dear Customers,

Following the official release of iOS 18, we have identified cases where data erasure may fail on certain device / firmware combinations.

We are investigating changes in the IPSW firmware structure and are working on fixes. Some improvements have already been implemented, and we are continuing validation and further analysis.

If you encounter an erasure error on iOS 18, we recommend pausing operations on affected devices and waiting for the next update announcement.
For urgent cases, please contact support with the device model, iOS version, and error details.

We apologize for the inconvenience and appreciate your understanding.

投稿 Notice: Potential Erasure Errors on iOS 18MASAMUNE Erasure に最初に表示されました。

Update: iOS 18 Erasure Compatibility

Dear Customers,

Thank you for using MASAMUNE Erasure.

We have released an update to improve compatibility with iOS 18 erasure.
To apply the update, please close MASAMUNE Erasure and launch it again (auto-update).

Since iOS 18 has just been released, Apple servers may be congested and downloading the required IPSW firmware may take longer than usual.
We recommend testing erasure with one device first, then proceeding with bulk processing.

We appreciate your continued support of MASAMUNE Erasure.

投稿 Update: iOS 18 Erasure CompatibilityMASAMUNE Erasure に最初に表示されました。

Update: Support for iPhone 16 Series

Dear Customers,

Thank you for using (or considering) MASAMUNE Erasure.

Update Notice: Support for iPhone 16 series

MASAMUNE Erasure now supports data erasure for the iPhone 16 series.
Please restart the application to apply the update automatically.

If you experience any issues during erasure after updating, please contact our support team with the device model and error details.

Thank you for your continued support of MASAMUNE Erasure.

投稿 Update: Support for iPhone 16 SeriesMASAMUNE Erasure に最初に表示されました。

Why Data Erasure Matters: A Beginner’s Guide (Deletion vs. Erasure)

Why Data Erasure Matters: A Beginner’s Guide (Deletion vs. Erasure)

When you sell, return, or dispose of a smartphone or PC, the biggest risk is simple:
data that looks “deleted” can sometimes be recovered.
This article explains the difference between deletion and erasure, common leak scenarios, and a practical checklist.

What is data erasure?

Data erasure is a technical process that makes stored data unrecoverable in practice.
It is not the same as removing files from view.

Deletion vs. erasure

Regular deletion / reset

  • Often removes references to data, while the underlying data may remain
  • Recovery can be possible depending on the media and methods used

Data erasure

  • Uses overwriting or media-appropriate methods to reduce recoverability
  • Can produce records (logs/certificates) for governance and audits

What can go wrong (information leak impact)

  • Individuals: photos, contacts, messages, social and financial account exposure
  • Enterprises: customer data, contracts, trade secrets, partner trust and audit issues

Common scenarios where erasure is required

  • Device resale / trade-in
  • Lease returns and vendor returns
  • Server refresh and storage replacement
  • Employee offboarding and device collection
  • Office closure and disposal

A practical erasure checklist

  1. Backup: copy data you need to keep
  2. Unlink accounts: cloud services, MDM, device bindings
  3. Confirm encryption: check device encryption state
  4. Run erasure: choose a method suitable for HDD/SSD/mobile devices
  5. Verify & record: confirm outcomes; keep logs/certificates if required

FAQ

Q. Is factory reset enough?

In many cases, reset alone does not guarantee unrecoverability.
The right approach depends on your device type and operational context (encryption, backups, MDM, etc.).

Q. Is overwriting always safe for SSDs?

SSD behavior differs from HDDs, and overwriting may not affect all physical areas as intended.
Consider media-specific approaches where appropriate.

Next steps

If you operate at scale or need certificates for partners/audits, process design matters.
Share your requirements via Contact. For pricing, see Pricing.

投稿 Why Data Erasure Matters: A Beginner’s Guide (Deletion vs. Erasure)MASAMUNE Erasure に最初に表示されました。

GDPR & Japan’s Personal Data Protection Law: Practical Data Erasure Obligations for Enterprises

GDPR & Japan’s Personal Data Protection Law: Practical Data Erasure Obligations for Enterprises

For organizations handling personal data, data erasure is not a “cleanup task.”
It sits at the intersection of regulatory compliance, internal governance, and partner requirements.
This article summarizes practical points for designing an erasure process that you can execute and explain.

Disclaimer: This article is general information and not legal advice. Please consult official sources and professionals for final decisions.

Key takeaways

  • How to think about retention, minimization, and deletion requests under GDPR
  • What to focus on in Japan’s Personal Information Protection Act: security controls and vendor oversight
  • Why evidence (logs/certificates) matters for audits and accountability

Erasure = compliance + accountability

In practice, “we erased it” is not enough. You often need to demonstrate:
what was erased, when, by whom, by which method, and with what result.

GDPR: what to pay attention to

  • Storage limitation: avoid retaining data longer than necessary for its purpose
  • Data minimization: collect/retain only what you need
  • Deletion requests: establish a workflow and keep records of actions taken

GDPR includes enforcement mechanisms, and risk cannot be ignored.
Enforcement outcomes depend on context and specifics, so use official sources and professional review when designing policies.

Japan’s Personal Information Protection Act: what to pay attention to

  • Security management measures: organizational, human, physical, and technical controls
  • Vendor oversight: governance over processors, subcontractors, and operational controls
  • After purpose fulfillment: do not keep unnecessary data—operate deletion/disposal routines

Practical checklist for enterprises

1) Create an erasure policy

  • Retention periods by data type (rationale, owner, exceptions)
  • Workflows for disposal/return/transfer
  • Partner requirements (proof, witness, chain-of-custody)

2) Choose methods that match the media

  • Logical erasure: overwriting, where appropriate for the media and threat model
  • Cryptographic erasure: key destruction, assuming encryption is correctly implemented
  • Physical destruction: for final disposal when reuse is not required

3) Keep evidence (logs / certificates)

  • Device identifiers linked to your asset ledger
  • Method, timestamp, operator, and result (success/failure)
  • Erasure certificates (e.g., PDF) when required

How MASAMUNE helps (general)

Beyond choosing an erasure method, you need a process that reliably runs at scale.
MASAMUNE supports operations with execution records and audit-friendly evidence management.

  • Searchable execution logs
  • Certificate issuance/storage for audit trails
  • Process design aligned with return/transfer/disposal workflows

Summary

Data erasure is a core governance process. The most effective practical approach is building a system where you can
explain “what, when, how, by whom, and with what outcome.”

Next steps

If you want to design an erasure process aligned with your devices, workflows, and evidence requirements,
contact us via Contact. For pricing, see Pricing.

投稿 GDPR & Japan’s Personal Data Protection Law: Practical Data Erasure Obligations for EnterprisesMASAMUNE Erasure に最初に表示されました。

NIST SP 800-88 Explained: Clear / Purge / Destroy (Media Sanitization)

NIST SP 800-88 Explained: Clear / Purge / Destroy (Media Sanitization)

One of the most common causes of post-disposal incidents is simple: data that was “deleted” can still be recovered.
A widely referenced guideline for preventing this is NIST SP 800-88, published by NIST (the U.S. National Institute of Standards and Technology).

What you’ll learn (Key takeaways)

  • What “media sanitization” means in NIST SP 800-88
  • The 3 levels: Clear, Purge, Destroy — and how they differ
  • How to choose the right level for reuse, transfer, or disposal
  • What evidence/logging you should keep for audits and compliance

What is NIST SP 800-88?

NIST SP 800-88 is a guideline for sanitizing storage media (HDD/SSD/mobile devices/removable media, etc.)
in a way that matches your threat model and device characteristics.
The key point is that “factory reset” or “file deletion” is not the same as being unrecoverable.

The three sanitization levels

1) Clear

A logical approach intended to reduce the likelihood of recovery using typical software tools.
Examples include full-area overwriting and using OS-provided secure erase functions where appropriate.

  • Best for: Internal reuse, low-to-medium sensitivity data
  • Note: The correct method depends on the media type (especially SSDs)

2) Purge

A stronger level intended to address more capable adversaries and media-specific behavior.
For SSDs, this may include device-specific commands (e.g., Secure Erase) or cryptographic erasure.

  • Best for: External transfer/sale, data containing personal or sensitive information
  • Note: Choosing the wrong approach can create a “false sense of erasure”

3) Destroy

Physical destruction where the media is not intended to be reused.
This is considered when the goal is to practically eliminate recovery by destroying the storage medium.

  • Best for: Final disposal, extremely high sensitivity scenarios
  • Note: Operational controls (chain-of-custody, witness, records) matter as much as the act itself

How to choose the right level

  • Data type: personal data, customer records, contracts, trade secrets
  • Disposition: reuse internally vs. transfer outside vs. disposal
  • Media: HDD/SSD/mobile/tablet/external/server
  • Evidence requirements: do you need proof for audits or partners?

Audit-ready evidence: what to record

For audits and incident response, the most important question is: “What happened, to which device, how, and with what result?”
Having consistent records makes compliance and partner communication much easier.

  • Execution logs (device identifier, method, result, errors)
  • Operator/location tracking and asset ledger linkage
  • Erasure certificates when required (e.g., PDF)

FAQ

Q. Isn’t factory reset / deletion enough?

In general, deletion or reset does not guarantee unrecoverability.
The proper method depends on the threat model and the type of media.

Q. Is overwriting always safe for SSDs?

SSD behavior differs from HDDs due to wear leveling and internal mapping.
Media-specific approaches such as Secure Erase or cryptographic erasure should be considered.

Next steps

If you need help designing an erasure process that matches your devices, workflow, and evidence requirements,
start by listing your media types, volumes, return/disposal flow, and proof needs.
See Pricing and Contact for next actions.

投稿 NIST SP 800-88 Explained: Clear / Purge / Destroy (Media Sanitization)MASAMUNE Erasure に最初に表示されました。

iOS 26 アップデートに関する重要なお知らせ

平素より「MASAMUNE Erasure」をご利用いただき誠にありがとうございます。

Apple 社より iOS 26 / iPadOS 26 が 2025年9月15日に正式リリースされる ことが発表されました。
今回のアップデートでは、新しいセキュリティ基盤や機能強化への対応を目的として、十分な処理性能とハードウェア要件を満たすデバイスのみがサポート対象となっております。
その結果、iPhone XR、iPhone XS、iPhone XS Max など一部旧モデルは iOS 26 のアップデート対象外 となります。これは、Apple が毎年実施している「性能要件に満たない機種の切り捨て」によるものであり、セキュリティや最新機能を安定して提供するための措置とされています。

一方で、以下の iOS 26 アップデート対象機種 ではアップデートが可能となります。

iOS 26 アップデート対象機種(例)

  • iPhone 16 シリーズ(16 / 16 Plus / 16 Pro / 16 Pro Max / 16e)
  • iPhone 15 シリーズ
  • iPhone 14 シリーズ
  • iPhone 13 シリーズ(含む 13 mini)
  • iPhone 12 シリーズ(含む 12 mini)
  • iPhone 11 シリーズ
  • iPhone SE(第2世代 / 第3世代)
  • iPad mini(第5世代以降)
  • iPad Air(第3世代以降)
  • iPad(第8世代以降)
  • iPad Pro 11インチ(第1世代以降)
  • iPad Pro 12.9インチ(第3世代以降)

※ 上記は現時点での Apple 公表情報・各種報道に基づくリストです。


MASAMUNE Erasure への影響について

現在、iOS 26 を適用した一部の対応機種において、「MASAMUNE Erasure」での 安全な消去作業が進まない、またはエラーとなる可能性 があることを確認しております。

影響が確認された場合には、対象端末での作業を一時停止いただき、弊社からの修正版リリースや対応状況のご案内をお待ちいただきますようお願い申し上げます。


ご利用者様へのお願い

  • iOS 26 へのアップデートを実施される際は、上記の注意点をご確認ください。
  • 消去作業に不具合が生じた場合には、速やかに作業を中断し、弊社からの追加情報をお待ちください。

ご利用の皆様にはご不便をおかけいたしますが、現在、問題解決に向けて全力で対応を進めております。
引き続きのご理解とご協力を賜りますよう、何卒よろしくお願い申し上げます。

Important Notice: iOS 26 Update Support

We are pleased to announce that MASAMUNE Erasure now fully supports iOS 26. Our data erasure solution has been updated to handle the latest security features and encryption methods introduced in iOS 26.

Key updates include:

  • Full compatibility with iOS 26 devices
  • Enhanced network restriction detection
  • Improved erasure verification for new security features

Please update to the latest version of MASAMUNE to ensure full iOS 26 compatibility.