Backup/Causes of data loss
Causes of data loss include device failure, software bugs, software lock-in, and human error.
The magnetic head that floats close to a hard disk's metal platters could crash onto it, the spinning motor's lubrication could wear down, a manufacturing defect could lead to early defect, or a storage controller could malfunction due to a voltage spike caused by a malfunctioning power supply or a lightning strike.
Since RAID storage systems are more complicated, they have more points of vulnerability, such as a malfunctioning controller that could damage data even if the individual drives are working well, or a drive failure poking holes over the entire data stored on the system due to lack of redundancy drives.
This happens because RAID systems typically stripe data across drives to multiply sequential transfer rates, since it allows the individual drives to work in parallel. This performance benefit comes at the cost of vulnerability to data loss, thus requires redundancy drives (or "pairity drives") so the user can swap out a defective drive, and data can be automatically restored on a functional drive.
The complexity of RAID storage systems also makes it more susceptible to maintenance errors.
Users have reported parts of their mobile phones' internal storage to becoming inaccessible, folders disappearing during a move, bogus software updates rendering devices inoperable, faulty colourspace conversion causing the operating system to crash in perpetuity, and all contents of their internal storage being deleted.
Data stored on the memory card is less likely to get lost, since a memory card can be ejected and read externally, as well as being recoverable to some extent using forensic software.
Should a failure such as a system crash or exhausted disk space occur while a file is being written to, the file might be truncated (partially cut off) or blanked. If the file is still opened in the program (for example, text editor), it can be saved on a different device or partition to prevent loss.
Another way to prevent it is creating revisions in separate files by occasionally changing the file name while saving. This can be an incremental number or time stamp.
File system modificationsEdit
Partition management is a highly risky task.
Before partitions on a data storage device are modified, a full-disk image backup should be taken, since any interruption in the process could destroy the file systems, making the files inaccessible. A full-disk image backup allows for recovery by writing the partitions in their state before the partitioning back to the device.
File system repair toolsEdit
Tools such as check disk on Windows and file system consistency check on Linux intend to repair problems with a file system that could arise after writing to disk was interrupted, which could, for example, lead to inconsistencies between the files and the space marked as used. On Windows, CHKDSK also renames and relocates files with names containing characters Windows considers invalid such as colons and question marks that might have been created on a Linux-based operating system.
It is recommended to renew the backup before running such tools, since they are not guaranteed to repair a file system successfully and might cause collateral damage. File system repair can be thought of as a digital surgery. Similarly to partition management, an interruption in the process can lead to enormous damage.
However, on journaled file systems such as NTFS (default on Windows and widely pre-formatted on external drives) and ext4 (default on Linux) and UDF (optical discs), file system checking is usually not needed after a power interruption, and when it is, it is more reliable than on old-fashioned file systems such as FAT32 that lack a journal.
Human errors that can lead to data loss include the deletion of files and folders that one thinks are already backed up but are not, mistyping a command, choosing a wrong device for writing a disk image to, and dropping a device from a height or into liquid.
A damaged touch screen of a smartphone after a drop might be insensitive to touch, making it impossible access files. Even when the smartphone is connected to a desktop/laptop computer through a USB cable or wirelessly, the file transfer typically needs to be activated on the phone first, which is impossible if the touch screen is unresponsive.
Before working with sensitive tools such as
ddrescue, it is recommended to renew the backup and to unplug any momentarily unneeded external storage devices to protect them from overwriting accidents.
Avoid working with sensitive tools when tired. Fatigue and sleepiness increase the chance of accidents occuring.
On defective devices, data stored on a memory card is likely retrievable externally.
Vulnerable storage locationEdit
Some people make the mistake of treating the internal storage of their computer or mobile phone as a permanent archive.
There is nothing wrong about having redundant copies of files on such devices, and it is useful if accessed frequently. However, without an independent cold data backup, files stored on a device's internal storage are at risk of loss from any failure that would make the computer inoperable, ranging from malware, bogus updates, to component failure.
Some vendors of computers and smartphones let the user remotely erase their device if linked from an account, which is intended for use after physical theft. However, this leads to a risk of data being erased through a compromised account.
Bad user interface designEdit
Bad user interface design such as the ability to delete photos through a side-swiping gesture on some mobile photo viewers, or the ability to delete history items with a press of the "delete" key without confirmation on the Firefox web browser could cause the inadvertent deletion of data.
People might habitually store data inside a locked-in location such as a mobile phone application's internal data, thinking it will always be there. In reality, access to that data could be denied with little warning through a software update that removes a feature, or a software bug.
If data is stored in a locked-in location from where it can not easily be ported and is only accessible through specific software, the data will at most only be accessible for the lifespan of the one device it is stored on.
If an app is dependent on an online service, the unavailability or discontinuation of that service could make user data inaccessible, if the app is poorly designed to refuse starting if no connection to the service provider can be established.
Instances of software lock-in include:
- Some mobile browsers like Samsung Internet for Android (earlier known as "S Browser") lock saved pages away in the
/data/directory, from where they can not be backed up or copied to other devices, except with root access, which is locked behind the bootloader by default, and unlocking that typically involves a full device erasure.
- In April 2019, software support for the "software as a service" Telekom Entertain 303 Media Receiver, a digital television apparatus, was deprecated. Since the operating system is software as a service, it stopped working as well, making recordings stored on the hard disk inaccessible. The USB port of the device could not be used for recording or file transfer, and the operating system could also not read USB sticks with existing media. It has no use beyond a 0.5A charger. Data on the device's hard disk was stored in a proprietary format.
The device was introduced in 2011, so people would lose up to eight years of recordings. But since data could not be moved anywhere else from the built-in 500 GB HDD of the device, people were forced to delete recordings anyway to be able to record new footage.
Overreliance on online servicesEdit
People who have stored data into online services have repeatedly made the mistake of not retaining a local copy, which lead to them losing access to their data. For example, people uploaded home videos on YouTube without locally retaining the original files. Due to the possibility of videos being removed and accounts being terminated in error, and the difficulty of reaching a YouTube employee for review, a local copy of such videos should be kept.
Another example is that Google frequently locks user accounts and demands users to disclose their phone number to regain access. In Germany, it is mandatory since July 2017 to identify oneself to obtain a mobile phone number. Other countries have introduced similar laws over time. So Google holds accounts hostage until one provides personally identifiable information. Internet companies have disrespected users' privacy by using mobile phone numbers for commercial purposes in the past.
Among the largest data loss disasters on Internet social networking services occurred on MySpace. The majority of audio tracks uploaded to the site were lost, reportedly due to a maintenance error. The music tracks were listed but unplayable, with the earliest reports of tracks being unplayable dating back to December 2017. Initially, the site's developers reported trying to solve the problem, presumably to delay an uproar, but later came to acknowledge that the data was permanently lost. The incident was dubbed a "datapocalypse", a portmanteau from "data" and "apocalypse". Even after the web site spontaneously removed the user blogging feature along with existing user blogs without announcement in 2013, nearly five years earlier, some people were still not compelled enough to back up their data locally, resulting in them losing it.
Cloud storage providers usually close long unused accounts to clear disk space for new users. Cloud storage is for short-term convenience, not archival. Exceptions are dedicated paid services with this stated purpose. However, due to lack of control, even those do not replace a local copy.
Loss of access credentialsEdit
Data in encrypted archive files or file systems or on a cloud service is at risk of loss if the access credential, commonly a password, is lost. This is unlikely to happen over a short time span, but significantly likelier in absence in the long term.
As mentioned above, cloud storage providers purge long inactive accounts, meaning by the time one forgets the credentials to a long unused cloud account, it might not exist anymore.
Loss and theftEdit
Portable devices such as mobile phones that store data can be lost or stolen.
This risk is higher during trips, where one might, for example, leave a bag with personal belongings unattended in a crowded area.
The loss of data from such an occurance can be minimized by backing data up to a storage device left at the base (such as a hotel or rented appartment), and synchronized to a cloud storage service if the mobile data plan allows for it.
Although less likely, data could be lost to home burglary as well, especially when stored on the internal storage of expensive devices that are attractive to burglars due to their resale value. Data can only be protected from burglary by storing a copy in a separate location.
In some locations of the world, people may have to be considerate about natural disasters. For example, a flood disaster could soak a basement, destroying all data storage except for optical discs. This can be prevented using water-tight bags or containers. A basement however is the least vulnerable to an earthquake due to being supported by the surrounding earth. An earthquake mainly targets the top of a house, which could be completely destroyed if the house collapses.
- ↑ "Scrub Your NAS Hard Drives Regularly if You Care About Your Data". Louwrentius.com. 2020-04-22. Retrieved 2023-01-21.
- ↑ Omnia 2 doesn't recognize internal storage! – XDA forum user WhiteRussianBC – September 2nd, 2010
- ↑ "My Memory" (8GB) on Ominia II (GT-I8000L) has disappeared! – XDA forum user mattbiondi – May 10th, 2010
- ↑ Photos disappeared after moving to another device folder – Gökhun Güneyhan – Google Photos community (April 24th, 2018; 57 replies)
- ↑ Apple iOS update BRICKS repaired iPhones after screen repair - Louis Rossmann (2018-04-10)
- ↑ How THIS wallpaper kills your phone (by Arun Maini, Mrwhosetheboss, 2020-06-04)
- ↑ I just deleted a random folder in my internal storage and it wiped my internal storage. What the heck just happened? – Reddit – /r/Android (January 11th, 2013)
- ↑ islaambaduk_ (2022-11-14). "3 years of data wiped clean*accidentally*". Reddit. Retrieved 2023-01-15.
Was partitioning the drive in cmd and the shit happened
- ↑ Wikipedia: CHKDSK
- ↑ Alles weg - Hochformat (Simon Unge), January 29th, 2020 – smartphone (iPhone XS plus or iPhone 12 plus) stuck on boot screen after falling from a height of several metres onto a carpet. The carpet did cushion the impact, but not enough to prevent damage to the device.
- ↑ Prank geht schief – BibisBeautyPalace (Bianca Heinicke), December 15th, 2016 (at 2 minutes and 54 seconds) – smartphone (iPhone 6s) dropped into pool. Afterwards, it powered on but the touch screen was unresponsive to input.
- ↑ Get data from cracked Nexus 4 - Panomosh - January 5th, 2015 - XDA developers
- ↑ 13.0 13.1 davdreamer (2022-07-09). "Stolen laptop in Westmeath Ireland, Please Help!". Imgur. Retrieved 2023-01-10.
the laptop has five years of photos as well as a book I had just finished writing!, "if I could hop in my time machine and back everything up I would."
- ↑ 14.0 14.1 Honan, Mat (2012-08-17). "Mat Honan: How I Resurrected My Digital Life After an Epic Hacking". Wired. ISSN 1059-1028. Retrieved 2023-02-06. "Had I been regularly backing up the data on my MacBook, I wouldn't have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location." "And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook."
- ↑ "Methodology to protect your data. Backups vs. Archives. Long-term data protection - Apple Community". discussions.apple.com. 2014-06-14. Retrieved 2023-02-06. "No computer, regardless of HD or SSD size is a data storage device, and should never be considered as such." "All collections of media files such as pictures, music, and videos, unless directly needed should be kept off the notebook and on an external hard drive or likewise."
- ↑ everyoneelsethatlive (2022-01-29). "Whatsapp "deleted" all my videos of a passed loved one. Panicking". Reddit. Retrieved 2023-01-14.
A person close to me recently passed away and a lot of messages, voice messages, pictures and videos in our conversation were saved on the app and meant a lot to me. Today I noticed I couldn't play videos from our conversation (both the ones I sent and the ones he sent).
- ↑ The sad state of personal data and infrastructure - Karl Icoss, BeepB00p.xyz
- ↑ Schamberg, Jörg (17 January 2019). "Telekom zieht 2019 beim alten "Entertain" den Stecker". onlinekosten.de (in German). Archived from the original on 12 April 2021. Retrieved 3 October 2022.
- ↑ My youtube account was terminated for "nudity or sexual content". Worried about losing thousands of hours of private/unlisted videos for our business. – /r/PartneredYouTube – Reddit (May 12th, 2022)
- ↑ My channel got terminated without reason, (No strikes, no warnings) I worked 4 years on this . (September 23, 2021) ("I have old personal videos that I have not saved anywhere else in there saved as private and do not want to lose them.")
- ↑ Tweet from February 25th, 2022: "@TeamYoutube can you unban my old youtube account, it has alot of old video memories that i had not saved in my computer yet and all i would really want is to get them back[…]"
- ↑ 3 Things I Wish I Knew when I First Started on YouTube (at 01m02s) by Tim Schmoyer, Video Creators TV – honeymoon videos taken down due to copyrighted music in background.
- ↑ Pieruschka, Von Marius (5 August 2016). "Prepaid-Karten: Ausweispflicht ab 01. Juli 2017". 4G.de – Das offizielle Infoportal zum Thema 4G, LTE, HSPA+ etc. (in German). Retrieved 3 October 2022.
- ↑ "Timeline of SIM Card Registration Laws". Privacy International. 2019-06-11. Retrieved 2023-01-10.
- ↑ Tell HackerNews: Google requiring phone number to log into Chromebook – YCombinator – September 9th, 2018
- ↑ Google is forcing me to enter a phone number to login to my account – Reddit – /r/Privacy – January 7th, 2021
- ↑ Google, Stop Asking Me for My Phone Number – Austin – GroovyPost – May 14th, 2012 ("Despite skipping through the process multiple times, Google has continued to harass me with phone number requests. How many times will I have to login and skip it before Google gets the idea? Where is the opt-out button?")
- ↑ Ravie Lakshmanan (2022-05-26). "Twitter Fined $150 Million for Misusing Users' Data for Advertising Without Consent". Retrieved 2023-01-29.
- ↑ MySpace music profiles – Reddit post from December 9th, 2017: "I have music on a profile from when I was making music […] That is the only copy In Existence and would love to have it again for the memories"
- ↑ Brodkin, Jon (18 March 2019). "Myspace apparently lost 12 years' worth of music, and almost no one noticed". Ars Technica. Retrieved 24 September 2022.
- ↑ "MySpace Punishes Its Few Remaining Friends By Vanishing Their Blogs". TechCrunch. 12 June 2013. Retrieved 24 September 2022.
- ↑ Novet, Jordan (23 February 2018). "Dropbox shows how it manages costs by deleting inactive accounts". CNBC. Retrieved 3 October 2022.