• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About
What is Dumpster Diving?

What is Dumpster Diving?

February 2, 2023 by Mel Hawthorne Leave a Comment

Dumpster diving is the concept of sifting through trash. Typically this doesn’t necessarily involve physically entering a dumpster but rather just reaching in, but it can involve literally “diving” into dumpsters. The concept is fairly general and often involves people that are struggling to make ends meet claiming discarded but still edible food or items that can be resold.

For example, in first-world countries, supermarkets often throw food away once it has reached its best-before date, or even if it just has imperfections. This food is generally still perfectly edible, and some people choose to take it from the bins. Furthermore, often people throw away functional goods that they no longer want or need. A dumpster diver may identify these items and resell them.

But where does the tech come in? Well, sometimes people and companies throw away tech items or data. A dumpster diver may be able to make remarkable use of this.

Dumpster diving phreaks

While dumpster diving has probably been going on since humanity has had trash to rummage through, it generally wasn’t considered too much of an issue until things got “phreaky”. One of the early forms of hacking didn’t directly involve computers. Instead, phone systems were the targets. From the 1950s to the 1970s telephone systems in the US were automatically switched through the use of tones. To dial a number you pressed keys, these keys each had a distinct audio tone, and the system decoded these tones and put you through.

Because these tones were played through the same communication system as normal speech, it was possible to replicate the tones and get put through. Furthermore, the tones also controlled the rate at which the call was charged so fees could be reduced or dodged entirely by playing custom tones. Making use of this knowledge was called “phreaking” the person doing so was called a “phreak”. The term “phreak” is a sensational spelling of “freak”, using the first two letters from “phone”. Many such figures are highly respected in the computer hacking culture.

To be able to make proper use of the system a fair amount of knowledge was needed. Some of this could be scrounged together by just listening to the tones. But many phreaks learned what they needed to by dumpster diving. Specifically, they would go through the dumpsters of phone companies and read through the system manuals that had been simply thrown away. In this way, the phreaks often became even more knowledgeable about the precise intricacies of the phone system than the people running it.

Dumpster diving hackers

With phreaks learning about telephone systems by dumpster diving, many early hackers also used the same techniques. Again, by targeting the dumpsters of companies making or using computer systems, especially big mainframe systems, they could eventually get their hands on user manuals and other technical documents. With this information and with a driving sense of curiosity, these hackers often ended up knowing the system better than its architects. In this way, they could be incredibly effective at gaining access by exploiting vulnerabilities.

Often the vulnerabilities exploited weren’t anything massively complicated. Instead, they could be as simple as not having an authentication mechanism at all and then connecting it to the Internet, or a network with Internet access. In many cases, these early hackers didn’t particularly use their knowledge maliciously. Yes, they hacked in, illegally, but often they’d just poke around, leave some sort of “I was here” flag message and leave again without breaking anything.

Dumpster diving leakers

Generally, if you don’t need something anymore you just throw it away. It can be fairly easy to not consider what data is on paper or hard drives that are being thrown. In some cases, dumpster divers have come across sensitive data on discarded paper records. Data can also be accessed from discarded hard drives, in or out of computers.

This exact risk is why many organisations and governments require that sensitive paper documents are shredded before they are trashed. It’s also why there are policies on hard drive wiping and even destruction.

The legal side of things and other risks

Technically, in most cases, dumpster diving is illegal. The contents of the bin belong to the owner of the bin and taking them is stealing. Generally though, this is extremely rarely enforced. Ethically, it makes sense to allow this. If someone throws something away, clearly they have no further use for it. If someone else then sees this and decides they can make use of it, it generally doesn’t harm the previous owner. The problem comes when what’s thrown away can be misused. Realistically though, this could and probably should be covered by other laws rather than theft.

Dumpster diving is also very much not recommended. You have no idea what’s in a dumpster. There could be toxic chemicals, biohazardous waste, or sharp metal or glass. Dumpsters may also be emptied without anyone actively checking inside them first which can be life-threatening for a person inside.

Conclusion

Dumpster diving is the act of rummaging through trash. It doesn’t necessarily mean explicitly diving into a dumpster. Generally, it’s done looking for food or items that can be resold. Historically though, hackers and phreaks used it as a method to gain access to product manuals and documentation. This gave them a significant amount of knowledge of the system and made it easier to manipulate. Spies, private eyes, and police may also dumpster dive as part of an investigation. Generally, if you’re disposing of sensitive information either physical or digital, it should be destroyed in some manner before being disposed of. This mitigates the potential threat of dumpster diving.

Filed Under: Hardware

Reader Interactions

Did this help? Let us know!

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Recent Posts

  • Google One: How to Remove People or Objects in the Background
  • How to Know What App Have Access To Your Camera and Mic in Windows 11
  • How to Enable and Use Windows 11 Night Light
  • How to Create and Manage Tasks in Microsoft To-Do
  • How to Fix Explorer.exe: Class Not Registered Error in Windows 11
  • How to Fix Explorer.exe Doesn’t Load at Startup Issue
  • How to Enable/Disable Efficiency Mode in Windows 11
  • How to Create and Edit a Playlist on YouTube Music

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy