logo
One Tech Tip: Thinking of buying a secondhand phone? Some tips on what to look for

One Tech Tip: Thinking of buying a secondhand phone? Some tips on what to look for

Independent24-04-2025

New smartphones aren't cheap and prices could reach even higher as globe trade tensions fueled by U.S. President Donald Trump's tariff threats throw Asian exports into turmoil.
To save money, consider buying a secondhand device.
The market for used cell phones is booming. It's now growing faster than the market for new devices, according to CCS Insight, a U.K.-based tech research firm.
As each new model release sends consumers rushing to upgrade, they'll also be selling or trading in their existing devices, which usually have lots of life left.
If you're on a budget, a refurbished secondhand phone can be up to 50% cheaper than new, and they now come with warranties, flexible financing and after-sales service, CCS said in a recent report.
Meanwhile, the starting price of a new top of the line iPhone Pro Max could potentially rise 29% from $1,550 to $1,200, according to a UBS estimate.
But buying a secondhand device is less straightforward than buying a new one. Here are some pointers:
Which phones are the most popular?
Apple fans will have the most choice because iPhones make up about 60% of the global market for secondhand phones, according to CCS insight. Samsung Android devices are second with about 17%. The rest is made up of lesser known Chinese brands like Xiaomi.
Where can I buy them?
There are numerous places online to buy secondhand phones, but like much of the internet, there are many scammers. The usual advice applies: check reviews, look for trusted sellers and guarantees, and avoid deals that seem too good to be true.
Try platforms that specialize in selling secondhand electronics and other goods such as Gazelle and Backmarket. Refurbished phones are also available from retailers like BestBuy and Amazon. Phone companies also sell them, so check with your wireless carrier.
Even Apple and Samsung sell secondhand devices on their websites. The advantage there is that they've been refurbished by their in-house technicians, so you'll know they'll be reliable. The downside is that discounts aren't as significant and selection can be limited. Apple's website currently only lists refurbished iPhone 13 and 14 models, for example.
When a phone is refurbished, it normally means that the data has been wiped and it has been tested and inspected for any problems. Any defective or faulty components are normally replaced.
A used phone, however, could refer to any secondhand device, including those sold by individuals through online classifieds like Facebook Marketplace. Prices could be cheaper but it's buyer beware because used phones are often sold as-is and usually without any repairs or guarantees.
'You will get the best price if you're prepared to handle that risk,' Simon Bryant, vice president of research at CCS Insight.
Lots of used phones are also sold on marketplaces for so-called peer-to-peer transactions that also offer better protections for buyers, like eBay or Swappa, which have policies for refunds if a phone isn't as it was advertised.
What about the battery?
Just because a phone is refurbished doesn't mean that critical components — especially the battery — have been automatically replaced. It depends on a vendor's seller's policies.
Apple and Samsung say their secondhand phones come with new batteries and, in Apple's case, a new shell. Both companies also include a cable, a one-year warranty and a new box.
Meanwhile, other platforms might merely guarantee that a battery has a certain level of its original capacity, usually 80%.
How do I judge the quality?
There are ratings, but be cautious with the terminology.
Each secondhand platform will usually have its own system of grading the quality of the devices it's selling. It's a useful gauge for comparing various phones that the vendor has for sale.
But keep in mind there's no universal system of grading. One platform's rankings might, for example, read 'Good, Very Good, Pristine and Like New,' while another will run from 'Fair and Good to Excellent and Premium.'
Grading is 'all over the place,' said Bryant, and it makes it difficult for consumers to compare, say, a $300 phone rated 'Grade A' on one site with the same device on another site rated 'like new' and priced at $280.
'It makes it difficult to shop around,' he said.
How old is too old?
Bryant advises buyers to look for a phone that's about three generations old, and avoid anything that dates back more than five or six generations because that's getting to the point where its Android or iOS operating systems may not be supported anymore.
Three generations is 'the sweet spot," said Bryant. 'You know it's going to work. It's going to have relatively new features and it's not going to be used so much. So the wear and tear on the device will be less.'
What about the risk that a phone is stolen?
Most online marketplaces have safeguards to prevent stolen phones from being sold to consumers, but check the policies to be sure.
If a phone is reported stolen, the carrier will usually blacklist the serial number, known as the IMEI number.
Swappa requires sellers to run their device's serial number through its online checker before it can be listed for sale. The number can be found by dialing (asterisk)#06#. Some phones have two IMEI numbers, so Swappa advises checking both.
BackMarket says it works with the certified sellers that use its platform to make sure there are no blacklisted phones but sometimes "a bad apple" slips through. If that happens, it will work with buyers to return it immediately.
Can I check for water damage?
Most newer phones are water resistant and can withstand being dunked for a limited amount of time. But that doesn't mean they're totally waterproof. Any moisture that has gotten inside could damage components even if the phone looks fine from the outside.
If you're buying a used phone in person, you can check if it has been exposed to liquid. Apple has a guide to finding the liquid contact indicator that every iPhone since 2006 has. Samsung has a similar page for Android devices.
What about accessories?
Charging cables or earphones might not be included. Don't forget to budget for these.
___
Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

iOS 26: The Ultimate Upgrade for Your Apple Device
iOS 26: The Ultimate Upgrade for Your Apple Device

Geeky Gadgets

time15 minutes ago

  • Geeky Gadgets

iOS 26: The Ultimate Upgrade for Your Apple Device

Apple's iOS 26 introduces a wide array of features and improvements aimed at enhancing your mobile experience. With a focus on functionality, performance, and compatibility, this latest iteration builds on the strengths of its predecessors while addressing user needs with precision. From a redesigned interface to advanced privacy measures, iOS 26 offers a well-rounded update for both seasoned Apple users and newcomers to the ecosystem. The video below from iDB gives is another look at the new iOS 26. Watch this video on YouTube. Key Features and Updates iOS 26 brings a variety of updates designed to improve usability, productivity, and accessibility. These enhancements reflect Apple's commitment to creating a seamless and inclusive user experience. Some of the most notable features include: Advanced multitasking: New tools simplify switching between apps, allowing you to manage tasks more efficiently and stay organized. New tools simplify switching between apps, allowing you to manage tasks more efficiently and stay organized. Redesigned notifications: A cleaner, more interactive notification system ensures you can quickly access important information without unnecessary distractions. A cleaner, more interactive notification system ensures you can quickly access important information without unnecessary distractions. Enhanced widgets: Widgets now offer greater interactivity, allowing you to perform actions and access real-time updates directly from your home screen. Widgets now offer greater interactivity, allowing you to perform actions and access real-time updates directly from your home screen. New accessibility tools: Features like improved voice control, customizable display options, and enhanced assistive technologies ensure inclusivity for all users. These updates are crafted to make your device more intuitive and adaptable, catering to a wide range of user preferences and needs. A Cleaner, More Intuitive Interface The user interface in iOS 26 has been thoughtfully redesigned to enhance navigation and usability. These changes aim to provide a more seamless and enjoyable experience for users: Streamlined gestures: Navigation gestures are now more responsive, making it easier to interact with your device and access key features. Navigation gestures are now more responsive, making it easier to interact with your device and access key features. Updated Control Center: Frequently used settings are now more accessible, reducing the time spent searching for options and improving overall efficiency. Frequently used settings are now more accessible, reducing the time spent searching for options and improving overall efficiency. Modern aesthetics: The refreshed design balances innovation with familiarity, offering a visually appealing yet consistent user experience. These refinements ensure that whether you're customizing your settings or browsing apps, the interface feels intuitive and user-friendly. Performance and Efficiency Enhancements Performance remains a cornerstone of iOS 26, with improvements that enhance speed, efficiency, and reliability. These updates ensure your device can handle demanding tasks with ease: Faster app launches: Applications open more quickly, reducing wait times and improving overall productivity. Applications open more quickly, reducing wait times and improving overall productivity. Smoother animations: Transitions and interactions feel more fluid, contributing to a polished and responsive user experience. Transitions and interactions feel more fluid, contributing to a polished and responsive user experience. Improved battery efficiency: Optimized resource management extends battery life, even during intensive usage such as gaming or multitasking. These advancements ensure that your device performs at its best, whether you're working, streaming, or simply browsing. Privacy and Security at the Core Apple continues to prioritize user privacy and security with iOS 26, introducing features that give you greater control over your data and protect against modern threats. Key updates include: Expanded app tracking transparency: Gain deeper insights into how apps use your data and easily manage permissions to maintain control over your personal information. Gain deeper insights into how apps use your data and easily manage permissions to maintain control over your personal information. Privacy Dashboard: A centralized hub provides a clear overview of data access and permissions, empowering you to make informed decisions about your privacy settings. A centralized hub provides a clear overview of data access and permissions, empowering you to make informed decisions about your privacy settings. Advanced encryption protocols: Enhanced encryption ensures that your data remains secure during both transmission and storage. Enhanced encryption ensures that your data remains secure during both transmission and storage. Real-time threat detection: New systems actively identify and mitigate potential vulnerabilities, keeping your device protected against emerging threats. New systems actively identify and mitigate potential vulnerabilities, keeping your device protected against emerging threats. Improved biometric authentication: Face ID and Touch ID are now faster and more reliable, offering seamless and secure access to your device. These updates underscore Apple's dedication to safeguarding your personal information in an increasingly data-driven world. Broad Compatibility and System-Wide Optimizations iOS 26 is designed to work across a wide range of Apple devices, making sure that both newer and older models can benefit from its features. Apple has optimized the operating system to deliver a smooth experience even on older hardware, reflecting its commitment to supporting a diverse user base. Additionally, system-wide enhancements contribute to improved stability and functionality: Refined background processes: Reduced resource consumption ensures smoother multitasking and overall operation. Reduced resource consumption ensures smoother multitasking and overall operation. Core app improvements: Updates to built-in apps like Safari and Mail enhance usability, speed, and efficiency. These optimizations ensure that iOS 26 delivers a reliable and enjoyable experience, regardless of the device you use. Why iOS 26 Stands Out iOS 26 represents a thoughtful evolution of Apple's mobile operating system, combining a refined user interface with robust performance, privacy, and security enhancements. Its new features, broad compatibility, and system-wide improvements make it a compelling upgrade for users seeking a more intuitive and efficient device experience. Whether your focus is on productivity, security, or usability, iOS 26 delivers a comprehensive update that caters to a diverse range of needs. Take a look at other insightful guides from our broad collection that might capture your interest in iOS 26 features. Source & Image Credit: iDB Filed Under: Apple, Apple iPhone, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.

China-US trade deal kicks the rare earths can down the road
China-US trade deal kicks the rare earths can down the road

Reuters

time22 minutes ago

  • Reuters

China-US trade deal kicks the rare earths can down the road

LAUNCESTON, Australia, June 12 (Reuters) - The tentative deal between the United States and China may represent a retreat from the worst-case scenario of a total collapse of trade between the world's two biggest economies, but it creates more problems than it solves. President Donald Trump touted the agreement, which is still subject to final approvals on both sides, as a "great deal" that will be good for both countries. "We have everything we need, and we're going to do very well with it. And hopefully they are too," Trump told reporters prior to attending a performance on Wednesday evening at Washington's Kennedy Center. While not all the details are known, what has been revealed shows a deal that will probably hurt both economies, and not solve some of the pressing issues, such as China's dominance of the rare earths supply chain. The United States will impose tariffs of 55% on imports from China, while China can levy 10% on its purchases from the United States. This still represents a sharp increase in tariffs from the 25% on imports from China that was in place when Trump returned to the White House in late January. Tariffs at such a level are likely high enough to cause trade to shrink while boosting inflation in the United States, and lowering economic growth in both countries. If Beijing does keep 10% tariffs on imports of U.S. energy commodities, these will be high enough to ensure that virtually no U.S. crude oil, coal or liquefied natural gas enters China, eliminating one of the few products that China is able to buy in large quantities from the United States. It's also questionable whether the tariffs will be enough to prompt more manufacturing in the United States, or whether they will simply cause some production to shift from China to countries with lower import duties. Trump did single out rare earths when talking up the trade deal, saying China will provide the metals that are found in a wide range of electronics and vehicles "up front". But the deal does little to solve the underlying problem with rare earths, magnets and other refined metals such as lithium and cobalt, which are dominated by Chinese supply chains. At best, the agreement this week is a kick the can down the road type of deal, insofar as it prevents an immediate crisis in manufacturing in the United States, but leaves open the possibility that Beijing will once again threaten supplies if there are problems between the two sides in the future. China controls 85% of global rare earths refining, a situation that has hitherto largely benefited Western companies as they have been able to source the metals at prices far lower than what they would have had to pay had they tried to mine and process the elements by themselves. Rare earths are an example of the wider problem with so-called critical minerals. It's all very well to designate a mineral as critical, but if you don't actually do anything to secure a supply chain, then you really have to question just how critical the mineral is. Rare earths aren't really that rare, although finding economic deposits is challenging. It's the same for lithium, copper, cobalt, tungsten and a range of other metals that many governments designate as critical. But developing supply chains for these minerals and refined metals outside of China is costly, and so far Western countries and companies have been unwilling to commit funds. Companies won't develop new mines and processing plants if they have to compete with China at market prices, as very few projects would be economic. Governments have been sluggish in developing policies that would support new supply chains, such as guaranteeing offtake at prices high enough to justify investment, or by providing loans or other incentives. This means that the world remains beholden to China for these metals, and is likely to remain so until governments start to act rather than just talk. It's also worth noting that China will have learned from its latest talks with the Trump administration. As Trump himself may have put it, the United States doesn't hold all the cards, with Beijing having a few aces up its sleeve as well. The danger is always in overplaying one's hand. If Beijing keeps using rare earths as a trump card, it runs the risk that the West will cough up the cash to build its own supply chain. Enjoying this column? Check out Reuters Open Interest (ROI), your essential new source for global financial commentary. ROI delivers thought-provoking, data-driven analysis of everything from swap rates to soybeans. Markets are moving faster than ever. ROI can help you keep up. Follow ROI on LinkedIn, opens new tab and X, opens new tab. The views expressed here are those of the author, a columnist for Reuters.

MacOS Privacy Reimagined With Emerging VPN Features in 2025
MacOS Privacy Reimagined With Emerging VPN Features in 2025

Geeky Gadgets

time38 minutes ago

  • Geeky Gadgets

MacOS Privacy Reimagined With Emerging VPN Features in 2025

The current digital landscape is in perpetual flux, with user privacy and data security emerging as paramount concerns for individuals and organizations. As we approach 2025, Apple's macOS is poised to introduce a suite of advanced features meticulously crafted to significantly bolster user privacy, directly addressing the escalating global demand for more robust data protection. These forthcoming enhancements are expected to synergize with cutting-edge Virtual Private Network (VPN) technologies, culminating in a more secure and private online experience for Mac users. A notable increase in data requests from law enforcement agencies and third parties underscores the critical necessity for enhanced privacy safeguards. This pronounced shift towards enhanced privacy is not merely a transient trend but a fundamental recalibration of how users interact with their devices and the broader internet. Anticipated macOS updates, recently unveiled at events like WWDC25, are projected to introduce more granular controls and transparent privacy mechanisms. The integration and evolution of VPNs will undeniably play a pivotal role in this novel privacy paradigm, furnishing Mac users with supplementary layers of security and anonymity. The Escalating Imperative for Digital Privacy In recent years, the demand for digital privacy has surged dramatically as users become acutely aware of how their data is meticulously collected, utilized, and, occasionally, regrettably misused. Numerous high-profile data breaches and disconcerting revelations about pervasive data tracking practices by tech corporations and advertisers have significantly exacerbated these concerns. Many free VPN services, for example, often generate revenue by collecting and selling user data, sometimes even surreptitiously installing trackers or malware. This heightened risk environment has propelled consumers to seek more effective tools and platform features to protect their online activities meticulously. The ongoing development of increasingly sophisticated cyber threats, such as the high-severity double-free vulnerability recently identified in Linux's nftables firewall subsystem (CVE-2024-26809), further underscores the critical necessity for continuous vigilance and pervasive improvements in security measures across all operating systems. MacOS in 2025: A New Epoch for User Privacy Apple has consistently championed privacy as a foundational tenet of its product philosophy, and the newly announced macOS Tahoe 26 for 2025 is expected to deepen this unwavering commitment profoundly. These updates aim to provide users with unprecedented control over their personal information. Features like enhanced clipboard privacy, which will proactively alert users or necessitate explicit permission when applications attempt to access copied data, are a key part of this evolution. While macOS Sequoia 15.5, released in May 2025, primarily focused on typical bug fixes and security patches, it did lay the foundational groundwork by addressing various security flaws and improving features like Screen Time. The WWDC25 keynote in June 2025 provided the first comprehensive details on these significant privacy-centric enhancements. Spotlight on Evolving Security Protocols The bedrock of enhanced digital privacy invariably lies in the inherent strength and sophistication of underlying security protocols. As macOS continues to evolve, so will its robust support for and seamless integration of cutting-edge security standards meticulously designed to protect data in transit and at rest. While Apple typically develops its proprietary security frameworks, the broader tech industry's rapid advancements, such as the increasing global adoption of advanced VPN protocols, dominate the strategic direction of secure communications. The recent patching of multiple critical vulnerabilities in macOS Sequoia 15.5, which could have allowed malicious applications to illicitly access sensitive user data across diverse components, unequivocally highlights the vital importance of robust and meticulously updated security protocols. These ongoing, rigorous efforts ensure that Mac users consistently benefit from formidable protections against emerging threats and increasingly sophisticated attack vectors, contributing significantly to a safer and more secure computing environment. Native VPN Integrations: A Transformative Development? While macOS has long supported VPN configurations, future iterations could potentially witness deeper, more seamless native VPN integrations. Such advancements could simplify the user experience and encourage broader adoption of crucial VPN technology. These integrations might manifest as comprehensive system-level VPN management features, making it considerably easier for users to proactively protect all their internet traffic without necessitating extensive technical expertise. This could seamlessly integrate into Apple's broader strategic vision for greater cross-platform cohesion, as discussed for upcoming versions like iOS 26, iPadOS 26, and macOS Tahoe 26, potentially forging a more unified and inherently secure experience across the entire spectrum of Apple devices. The Pivotal Role of VPNs in Enhanced macOS Privacy Even with Apple's increasingly robust built-in privacy features, VPNs will remain indispensable in providing comprehensive online protection for Mac users. VPNs offer a distinct suite of capabilities that fundamentally transcend what an operating system can typically provide. These include but are not limited to, meticulously masking a user's IP address to effectively prevent pervasive tracking by websites, ubiquitous advertisers, and vigilant Internet Service Providers (ISPs). Furthermore, VPNs encrypt all internet traffic, meticulously securing data from potential interception, a particularly crucial feature when operating on inherently unsecured public Wi-Fi networks. Cybersecurity experts consistently recommend deploying the best VPN for MAC users to protect sensitive data and safeguard online privacy, often citing features such as optimized fast browsing speeds and seamless streaming capabilities. This additional, critical layer of security is essential for users who demand that their online activities, encompassing everything from casual Browse to sensitive financial transactions, remain unequivocally confidential and inherently secure. How VPNs Fortify macOS Security Measures VPNs serve as a potent and invaluable supplement to macOS's inherent security architecture by strategically adding crucial, impenetrable layers of protection. A primary and essential function is the creation of an encrypted tunnel meticulously established between the Mac device and the designated VPN server. This secure tunnel rigorously protects all internet traffic from potential interception, including that from ISPs who might otherwise monitor or illicitly throttle user activity. Many top-tier VPNs also ingeniously incorporate advanced features such as a 'kill switch,' which automatically and instantaneously blocks all internet traffic if the VPN connection unexpectedly drops, preventing accidental data exposure. Furthermore, rigorously enforced 'no-logs' policies, frequently and transparently verified by independent, third-party audits, provide an unassailable assurance that the VPN provider neither collects nor stores any user activity data. Selecting the Optimal VPN for Your Mac Selecting an appropriate VPN for your Mac necessitates meticulous consideration of several critical factors to ensure optimal performance, robust security, and uncompromised privacy. It is essential to seek out a provider with an impeccable reputation, an unequivocally clear no-logs policy (preferably verified by independent audits), and demonstrably robust encryption standards. The sheer number and broad geographical distribution of servers can also be a significant consideration, particularly for users who frequently need to access geo-restricted content from specific regions or who desire faster connection speeds by connecting to geographically proximate servers. Leading VPN providers are consistently noted for their fast speeds, strong encryption, and an extensive array of globally distributed servers, criteria equally applicable to Mac users. Meticulous attention should be paid to the supported protocols, with modern options like WireGuard frequently offering an exemplary balance of speed and security. When diligently evaluating a VPN for macOS, features such as a reliable kill switch, comprehensive DNS leak protection, and specialized servers optimized for specific activities like high-definition streaming or secure torrenting can significantly enhance the overall user experience. Some premium VPNs offer additional security benefits, including integrated ad-blocking or sophisticated malware protection. The availability and demonstrable quality of customer support are also critically important factors worthy of careful consideration. Given the increasing sophistication and pervasive nature of online threats, investing in a reputable paid VPN service is generally and strongly advisable over inherently free alternatives, which frequently come with significant and unacceptable privacy and security compromises. To aid in your selection process, consider this summary of paramount features: Strong encryption (e.g., industry-standard AES-256) (e.g., industry-standard AES-256) Independently audited no-logs policy: Ensures verifiable commitment to user privacy. Ensures verifiable commitment to user privacy. Kill switch functionality: Prevents accidental data exposure if the VPN connection drops. Prevents accidental data exposure if the VPN connection drops. Wide range of server locations: Offers flexibility for geo-unblocking and optimal speeds. Offers flexibility for geo-unblocking and optimal speeds. Fast connection speeds and modern protocols: for efficient data transfer. for efficient data transfer. DNS leak protection: Safeguards against exposure of your actual IP address. Safeguards against exposure of your actual IP address. User-friendly Mac application: Ensures ease of setup and daily operation. Ensures ease of setup and daily operation. Responsive customer support: Assists when needed. Assists when needed. Additional features: Integrated ad/tracker blocking for enhanced online safety. Embracing a More Secure Digital Future with macOS and VPNs The discernible trajectory towards a future of enhanced digital privacy is clear, and macOS is unequivocally positioned to be a pivotal driving force within this transformative movement with its 2025 advancements. These upcoming features, specifically engineered to prioritize greater user control and comprehensive data protection, will collectively establish a stronger native security foundation for Mac users. Nevertheless, VPNs' indispensable role will remain crucial. They consistently offer an additional layer of robust security and unassailable anonymity that flawlessly complements macOS's inherent, built-in protections. The powerful combination of a meticulously privacy-focused operating system and a demonstrably reliable VPN service collectively empowers users to confidently navigate the increasingly complex digital world with significantly enhanced peace of mind. \ Image Credit vee terzy Filed Under: Apple, Guides Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store