- cross-posted to:
- privacy@lemmy.world
- grapheneos
- cross-posted to:
- privacy@lemmy.world
- grapheneos
GrapheneOS provides users with the ability to set a duress PIN/Password that will irreversibly wipe the device (along with any installed eSIMs) once entered anywhere where the device credentials are requested (on the lockscreen, along with any such prompt in the OS).
The wipe does not require a reboot and cannot be interrupted. It can be set up at Settings > Security > Duress Password in the owner profile. Both a duress PIN and password will need to be set to account for different profiles that may have different unlock methods.
Note that if the duress PIN/Password is the same as the actual unlock method, the actual unlock method always takes precedence, and therefore no wipe will occur.
Doubt it, wouldn’t they just clone the flash first?
And for anyone to actually go through the trouble of cloning a flash chip, you’d have to be an extremely high profile target.
Who the fuck do you think interpol are targeting? Lmao
deleted by creator
Not at all - you could just be a US citizen coming back from a brief trip across the border.
A few congress critters have been trying to get bills passed to curtail this overreach for almost a decade, but unless I missed the news, none of them have succeeded.
Interpol aren’t the border agents… we are talking about interpol, not random seaches
Why, that can happen to anyone at the airport when entering the USA, UK, Australia, etc. Or if you have been in a car accident, your cell phone will be confiscated in Germany, for example. Or when you were forced to unlock the phones and banking apps at gunpoint: https://www.cbsnews.com/chicago/news/robbers-unlock-phones-banking-apps-gunpoint-bucktown-chicago/