Connect with us

Tech

Tips and Advice for Buying Used or Refurbished Electronics

Published

on

Tips and Advice for Buying Used or Refurbished Electronics


You can save money and help save the planet by buying used or refurbished electronics instead of new devices. Since most of the environmental impact of devices comes from the manufacturing phase, buying secondhand gear can reduce your carbon footprint. Do it right, and buying refurbished can feel much like buying new. This guide delves into what you need to know about refurbished terminology, offers tips on what to look for to snag yourself the best deals, and lists some of the best places to buy refurbished gadgets and used electronics.

You may also be interested in How to Buy Ethical and Eco-Friendly Electronics, The Best Used Tech to Buy and Sell, What to Think About Before Buying a Used Smartphone, and How to Responsibly Dispose of Your Electronics.

Updated March 2026: I’ve added some tips for buying, new links to refurbished sellers, and advice on what to do after you buy.

Table of Contents

What Does Refurbished Mean?

There is no legal definition of refurbished. Some sellers prefer used, pre-loved, secondhand, reconditioned—the list continues. Refurbishment implies that the seller has tested the device and may have repaired and cleaned it, but the only way to be sure is to read the fine print and understand what the seller means by whatever term is used.

If you’re lucky, you may get an open-box device, which a buyer has opened but never actually used. Sellers are not legally allowed to resell returned devices as new, and it’s common for all returns to end up sold in the same place. At the other end of the scale, you may end up with a device that looks like it has survived the apocalypse and doesn’t work.

Tips for Buying Refurbished

I’ll recommend a few good places to buy refurbished electronics below, but first, let’s explore what you should look for in a seller and what you need to do to protect yourself when you buy.

While buying older electronics is often a great way to save money, there are a few things to keep in mind. It may make more sense to buy a discounted flagship phone from a couple of years ago than a brand-new budget phone, for example, but there are also some potential cons. Always consider software updates and ask:

  • How many more years of software updates will the product receive?
  • How long will it continue to get security updates?
  • What version of the software does it come with?
  • How easy is it to update the software?

Aside from working out what the seller means by refurbished, you should read the listing for any potential purchase very carefully and try to answer questions such as these:

  • Has it been tested, and does everything work?
  • Does it have a new battery or a guarantee about battery health? (This is crucial for old phones and laptops.)
  • Has it been wiped if a previous user set it up?
  • Is there any cosmetic damage like scratches or cracks? (Look for a transparent grading system.)
  • What is included? (Does it come with chargers, cables, manuals, and original packaging?)
  • Is there any warranty offered? (The longer the better.)
  • If there is a problem, how do returns work? Do you have to pay, and what is the return window?

If you’re uncertain about anything, it’s worth asking before you buy to avoid disappointment.

Photograph: Simon Hill

There are protections for purchases, such as Section 170 of the Fair Credit Billing Act in the US or Section 75 in the UK. But you should use a credit card for purchases to get the best charge-back protection and avoid going through a third-party payment service, such as PayPal. Some banks and credit card companies are better than others, so it’s worth researching their reputations and the protections they offer.

If you can inspect and test devices before you buy, do it. Otherwise, you should closely examine and thoroughly test any device you buy immediately when you receive it. Remember that there is a limited window to report any faults or issues with the condition and return an item. Always keep the box and packaging it arrived in at least until you are satisfied that you won’t need to return it.

You’ve done your initial tests and decided that you are keeping the refurbished device you bought, but there are still a couple of things you might consider doing before you start using it.

Best Places to Buy Refurbished Electronics

Image may contain Electronics Mobile Phone Phone and Iphone

Photograph: Simon Hill

You have an enormous choice when buying refurbished electronics, so let’s break down your options.

We have had some good experiences buying refurbished devices from their original manufacturers, which makes sense since they know precisely how to test and repair their own devices. All of these manufacturers certify the refurbished devices they sell, and most offer at least a one-year warranty, but the savings vary; for example, Apple offers up to 15 percent off, while Dell offers up to 50 percent off.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Waymo Is Trying to Crack Down on Solo Kids in Driverless Cars

Published

on

Waymo Is Trying to Crack Down on Solo Kids in Driverless Cars


By law, autonomous vehicles aren’t legally allowed to carry unaccompanied minors in California. Waymo, Alphabet’s self-driving car company, doesn’t allow kids under 18 to ride alone anywhere outside of metro Phoenix, Arizona. But that hasn’t stopped some time-strapped parents from using their own accounts to transport their kids to school, extracurricular activities, and even social outings. Some have reported that the lack of drivers makes them feel safer.

Waymo is working to crack down on the practice, the company confirmed Friday, after reports of new mid-ride age-verification checks began to float around on social media. The company has “policies in place” to help it identify violations of its terms of service, Waymo spokesperson Chris Bonelli wrote in a statement to WIRED. “We are continuing to refine our system and processes for accuracy over time.” Violating its terms of service can lead to temporary or permanent suspension of an account, Waymo says.

The company uses cameras inside its cars to check that riders aren’t violating its rules. Its privacy policy notes that the company records video inside the vehicle during trips. Waymo says its support workers “may review video under certain circumstances,” and, “in more urgent circumstances,” access live video during a trip. The company says it does not use facial recognition or “other biometric identification technologies” to identify individuals.

The news comes a month after several California labor groups, including the California Gig Workers Union, filed a formal complaint with a state regulatory agency, accusing Waymo of violating the terms of its permit to operate in the state by knowingly transporting unaccompanied minors. The matter was assigned to a judge this week. The state is evaluating new rules that could allow solo riders under 18 in driverless cars, perhaps patterned after a program that permits ride-hail companies with human drivers to transport minors in California.

So far, several fresh-faced adults have been caught in the crossfire. On Tuesday, San Francisco machine learning engineer Nicholas Fleischhauer was about five minutes into his Waymo ride when the car connected him to support. A voice came over the line asking Fleischhauer to verify his age. He told the worker the truth: He’s 35. “I had messy and wet hair, and a backpack on me,” he says, by way of explaining why he might have been flagged by Waymo’s system. Plus, “people have told me that I look young for my age.” Fleischhauer says he takes Waymo weekly, but this marked the first time he had been asked about his age.

Since last summer, Waymo has allowed parents in the Phoenix area to set up teen accounts for riders ages 14 to 17. The accounts allow the teen riders’ adults to track their real-time locations during their trips. Waymo says a specially trained team of support agents deals with any issues its teen riders might have. Waymo says that “hundreds” of Phoenix families use the service each week.

In Waymo’s other markets across the US, adults are allowed to ride with guests under 18, though children under 8 must be in a secured car or booster seat.

Ethan S. Klein is 23, but his 26th LA Waymo ride on Thursday—plus the music he was listening to—was interrupted by an in-car call from a support agent who asked him, for the first time, to verify his birth date. Klein is an adult, but his first impulse was almost teen-like. “I was a little startled,” he says. “I thought I was in trouble!”



Source link

Continue Reading

Tech

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

Published

on

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers


Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of Linux is setting off alarm bells as defenders scramble to ward off severe compromises inside data centers and on personal devices.

The vulnerability and exploit code that exploits it were released Wednesday evening by researchers from security firm Theori, five weeks after privately disclosing it to the Linux kernel security team. The team patched the vulnerability in versions 7.0, 6.19.12, 6.18.12, 6.12.85, 6.6.137, 6.1.170, 5.15.204, and 5.10.254) but few of the Linux distributions had incorporated those fixes at the time the exploit was released.

A Single Script to Hack Them All

The critical flaw, tracked as CVE-2026-31431 and the name CopyFail, is a local privilege escalation, a vulnerability class that allows unprivileged users to elevate themselves to administrators. CopyFail is particularly severe because it can be exploited with a single piece of exploit code—released in Wednesday’s disclosure—that works across all vulnerable distributions with no modification. With that, an attacker can, among other things, hack multi-tenant systems, break out of containers based on Kubernetes or other frameworks, and create malicious pull requests that pipe the exploit code through CI/CD work flows.

“‘Local privilege escalation’ sounds dry, so let me unpack it,” researcher Jorijn Schrijvershof wrote Thursday. “It means: An attacker who already has some way to run code on the machine, even as the most boring unprivileged user, can promote themselves to root. From there they can read every file, install backdoors, watch every process, and pivot to other systems.”

Schrijvershof added that the same Python script Theori released works reliably for Ubuntu 22.04, Amazon Linux 2023, SUSE 15.6, and Debian 12. The researcher continued:

Why does that matter on shared infrastructure? Because “local” covers a lot of ground in 2026: every container on a shared Kubernetes node, every tenant on a shared hosting box, every CI/CD job that runs untrusted pull-request code, every WSL2 instance on a Windows laptop, every containerised AI agent given shell access. They all share one Linux kernel with their neighbors. A kernel LPE collapses that boundary.

The realistic threat chain looks like this. An attacker exploits a known WordPress plugin vulnerability and gets shell access as www-data. They run the copy.fail PoC. They are now root on the host. Every other tenant is suddenly reachable, in the way I walked through in this hack post-mortem. The vulnerability does not get the attacker onto the box; it changes what happens in the next ten seconds after they land there.

The vulnerability stems from a “straight-line” logic flaw in the kernel’s crypto API. Many exploits exploiting race conditions and memory corruption flaws don’t consistently succeed across kernel versions or distributions, and sometimes even on the same machine. Because the code released for CopyFail exploits a logic flaw, “reliability isn’t probabilistic, and the same script works across distributions, researchers from Bugcrowd wrote. “No race window, no kernel offset.”

CopyFail gets its name because the authencesn AEAD template process (used for IPsec extended sequence numbers) doesn’t actually copy data when it should. Instead, it “uses the caller’s destination buffer as a scratch pad, scribbles 4 bytes past the legitimate output region, and never restores them,” Theori said. “The ‘copy’ of the AAD ESN bytes ‘fails’ to stay inside the destination buffer.”

The Worst Linux Vulnerability in Years

Other security experts echoed the perspective that CopyFail poses a serious threat, with one saying it’s the “worst make-me-root vulnerabilities in the kernel in recent times.”

The most recent such Linux vulnerability was Dirty Pipe from 2022 and Dirty Cow in 2016. Both of those vulnerabilities were actively exploited in the wild.



Source link

Continue Reading

Tech

You Found Satoshi? Let’s See the Receipts

Published

on

You Found Satoshi? Let’s See the Receipts



Two new projects, including one from a Pulitzer-winning reporter, claim they’ve solved the mystery of Bitcoin’s creator. So why does the hunt continue?



Source link

Continue Reading

Trending