this post was submitted on 09 Nov 2024
987 points (98.4% liked)
Technology
60085 readers
2747 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You can enable lockdown mode. It forces the next unlock to ignore biometrics and require a pin, which police cannot force you to divulge without a warrant. Once enabled, you get a "lockdown mode" option in the menu when you hold down your power button.
If you haven't done this and need the same ability IMMEDIATELY: reboot, or just shut down
Every first boot requires pin same as lockdown
Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that, then theyre likely to fail to get that to work should you not manage to lock it down beforehand
Finally: there are apps that let you use alternate codes/finger unlocks to wipe/encrypt/reboot the device instead, allowing you to pretend to cooperate with the cops up until they realize they got played
IANAL, but I'd be very careful about wiping the phone like that. Sounds a lot like destruction of evidence...
Gotta prove there was evidence on the phone in the first place, which would take forensic work to do and be not worth the work in the majority of cases
Plus it would annoy them, and that's the real goal here
I imagine that would be one hell of a story to tell Bubba when they decide to lock you away for whatever false charges they can pin on you.
sounds like the point
It's not destruction of evidence though because without a warrant the information on the phone isn't evidence, it's just stuff on a phone. Stuff which is your stuff and you have every right to delete it whenever you want.
They would actually have to arrest you and acquire a warrant, try it to getting you to unlock the phone for it to be "evidence".
The police would have a very hard time in court saying that there was evidence on the phone when they can't produce any documentation to indicate they had any reason to believe this to be the case. Think about the exchange with the judge.
"Your honor this individual wiped their phone, thus destroying evidence"
"Very well, may I see the warrant?"
"Yeah... Er... Well about that..."
It doesn't matter what the police may think you have done, if they don't go via the process the case will be dismissed on a technicality. They hate doing that but they don't really have a choice.
So many words to explain how you literally have no clue about how the law works.
In what way am I wrong then?
I actually do this. 3 wrong attempts and the phone requires a password.
I consider it a very light measure and not something to rely on alone, but it's a bit of a no-brainer for how easy and unobtrusive this is.
Although lockdown mode is a good step and helps defend against biometric warrents, it does not wipe the encryption keys from RAM. This can only be achieved by using a secondary (non-default) user profile on GrapheneOS, and triggering the End session feature. This fully removes the cryptographic secrets from memory, and requires the PIN or password to unlock, which is enforced through the StrongBox and Weaver API of the Titan M2 secure element in Pixel devices.