this post was submitted on 08 Nov 2024
242 points (93.8% liked)

Technology

59287 readers
5759 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 63 points 3 days ago* (last edited 3 days ago) (2 children)

Android has an app that you can install that auto wipes a phone after X amount of time if the phone hasnt been unlocked:

https://f-droid.org/en/packages/me.lucky.wasted/

Also theres an app that allows you to set a fake password that wipes the phone:

https://f-droid.org/en/packages/me.lucky.duress/

All open source, I have tested these apps on my phones, they work great. The second app about the duress password is a bit glitchy and didnt work on some of my phones.

Disclaimer: I am not a lawyer and setting your phone to automatically wipe itself may be considered destruction of evidence in a court of law.

[–] [email protected] 4 points 3 days ago (1 children)

Thanks but I literally cannot figure out how to use these apps after installing

[–] [email protected] 3 points 3 days ago* (last edited 3 days ago)

For the "Wasted" app:

  1. Check the box saying "Wipe Data" (you can optionally check wipe eSim if yiu also want that to happen)

  2. Tap the bottom button saying [Off] which would ask you to give permission to the app as a Device Administrator, giving it the power to wipe your device.

  3. Tap the gear button on top right

  4. Scroll down to the "Lock" and check that

  5. Tap the upper left button with the 3 horizontal lines

  6. Tap the "Lock" menu option

  7. Enter a value. I personally would use something like 24 or 48 hours. Note that 24H automatically becomes 1D in the app, idk why but thats just some weird quirks with the app.

For the Duress app, it doesn't really work anymore on the phone I'm using, so you might have to do your own testing.

Edit: Make sure you dont get drunk and passed out for 24 hours because then your phone gets wiped lol. Good luck, I didn't make the app so be careful with it, don't blame me if your accidentally get your device wiped when you didnt want it to.

Edit 2: Also you cant really know if these apps works on your particular phone unless you test it yourself, that means wiping it. So you might wanna back up your phone then trigger the wipe to see if it works. Dont wanna get caught at a protest only to find out the app failed.

[–] [email protected] 5 points 3 days ago (1 children)

Nice, I think making your phone go into Before First Unlock mode cannot be considered destruction of evidence

[–] [email protected] 5 points 3 days ago* (last edited 3 days ago) (2 children)

Well they might charge you with "Obstruction of Justice" instead. Then plug it in some cellebrite device and boom, unlocked.

Best way to not have to deal with stuff like this is just to not have the incriminating evidence in the first place. If you are, for example, doing a protest, only chat with contacts in a safe place, then wipe chat logs every time, any data you wish to keep should be encrypted then uploaded anonymously via VPN/Tor and wiped from local storage. Hide the fact that such data exists so you wouldn't have a scenario where the government is trying to get you to give them the data, since they dont even know what data exists. Plausable deniability.

Edit: Those apps I've linked is still a good idea since "Destruction of Evidence" is probably a lesser charge than something like "Rioting".

[–] [email protected] 1 points 1 day ago (1 children)

Cellebrite struggles with iPhones already, this reboot is part of the cat and mouse game they’re playing

[–] [email protected] 1 points 1 day ago (1 children)

That's what they say. I mean the news literally base this off the FBI's own words, so there's no way for us to tell if they actually manage to break the encryption but then turns around that say "the encryption is too strong". Besides, iOS is closed source.

Intelligence agencies have made this "Anom Phone" that is this supposed encrypted phone that drug dealers and various criminals used to communicate, turned out to be a honeypot.

[–] [email protected] 1 points 1 day ago* (last edited 1 day ago) (1 children)

I’ve used cellebrite before.

Anecdote of 1 for you, iOS is a pain in the ass.

[–] [email protected] 1 points 1 day ago (1 children)

There are different versions.

One is where they sell the cellebrite device to law enforcement.

Another where the cellebrite device remain in control of cellebrite, and law enforcement has to send the phone to cellebrite.

Unless you actually work for cellebrite and got access to their more advanced tools, which then I doubt they would let you share the details of since that must be breaking some non-disclosure agreement.

[–] [email protected] 1 points 1 day ago* (last edited 21 hours ago)

Yes, I am well aware.

shipping a phone to them or waiting for the tech to arrive, that transit time, is what my mind went to immediately when this feature was introduced.

The phones are significantly more difficult to get into after the reboot.

I’m disclosing absolutely nothing.

[–] [email protected] 1 points 3 days ago (2 children)

Cellebrite? I don't think that's how encryption works

[–] [email protected] 3 points 2 days ago (1 children)

There are attacks where rather than trying to crank the password you just capture the hash which is stored in memory somewhere and then using a tool that lets you bypass the standard login inject that hash into the app, totally bypassing the UI interface and the password hashing algorithm.

The app sees the hash is correct and isn't aware that the information has been input via nonstandard methods, and so allows access.

The attacker still doesn't have a clue what your password was, but they don't need to. Interestingly enough this means that every time they want access to your data they have to do this because they don't have a way of actually changing the password or finding out what it was.

[–] [email protected] 1 points 2 days ago (1 children)

Link? That sounds incredibly stupid design

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago)

Yeah. It is. Every design has assumptions and every design can be abused by those assumptions. I'd like to say it's not a failure in design but it's really just a failure of imagination. No one thought this would be an issue, turns out it is, so someone fixed it.

The problem is that not every system gets updated.

[–] [email protected] 3 points 3 days ago (1 children)

It might work that way, actually .

Just because the phone is encrypted doesn't mean there's not an exploit that makes it easier to bypass or extract the passphrase. Celebrite is unfortunately pretty good at attacking out of support phone and breaking into them.

Use a modern, supported OS on a device put out by a trusted vendor and you're probably ok. But old software/hardware makes it much easier to bypass.

[–] [email protected] 1 points 2 days ago

Apparently some phones have a totally isolated electrically separated microcomputer which is in charge of encryption and decryption. Your phone doesn't actually know how the encryption decryption is done because it's separated from the microcontroller.

Any attempts to modify the microcontroller or replace any of its components with more cooperative components, will result in all of the data being wiped. This is implemented at the firmware level with the instructions being in ROM.