this post was submitted on 03 Jun 2024
253 points (100.0% liked)

Privacy

30004 readers
1518 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
 

GrapheneOS provides users with the ability to set a duress PIN/Password that will irreversibly wipe the device (along with any installed eSIMs) once entered anywhere where the device credentials are requested (on the lockscreen, along with any such prompt in the OS).

The wipe does not require a reboot and cannot be interrupted. It can be set up at Settings > Security > Duress Password in the owner profile. Both a duress PIN and password will need to be set to account for different profiles that may have different unlock methods.

Note that if the duress PIN/Password is the same as the actual unlock method, the actual unlock method always takes precedence, and therefore no wipe will occur.

Source: https://grapheneos.org/features#duress

all 30 comments
sorted by: hot top controversial new old
[–] DmMacniel@feddit.de 34 points 1 month ago (3 children)

Mhm i can imagine that GrapheneOS will be marked as an illegal OS once Interpol and others get wind of this kill switch.

[–] boldsuck@scribe.disroot.org 6 points 1 month ago

The people Interpool is after don't need Duress. They simply refuse to give out their password. Current Pixel and iPhones phones cannt be cracked with forensic tools. https://discuss.grapheneos.org/d/12848-claims-made-by-forensics-companies-their-capabilities-and-how-grapheneos-fares

[–] ryannathans@aussie.zone 1 points 1 month ago (1 children)

Doubt it, wouldn't they just clone the flash first?

[–] refalo@programming.dev 15 points 1 month ago (2 children)

irreversibly wipe the device

And for anyone to actually go through the trouble of cloning a flash chip, you'd have to be an extremely high profile target.

[–] ryannathans@aussie.zone 3 points 1 month ago* (last edited 1 month ago)

Who the fuck do you think interpol are targeting? Lmao

[–] mypasswordis1234@lemmy.world 31 points 1 month ago

That may be useful

[–] smileyhead@discuss.tchncs.de 21 points 1 month ago (1 children)

Wonder if this say a big "WIPING..." and shows a blank profile then.

Because it would be much more useful if this would erase real profile and then quickly switch to some fake profile looking real.

[–] Andromxda@lemmy.dbzer0.com 1 points 1 month ago

It doesn't say anything. It shuts the device down almost instantly, and simulnateously wipes the encryption keys from the secure element, ensuring that the data stored on the SSD can't be decrypted.

[–] ryannathans@aussie.zone 12 points 1 month ago (1 children)
[–] ResoluteCatnap@lemmy.ml -2 points 1 month ago (1 children)

Why didn't you contribute this feature sooner then?

[–] ryannathans@aussie.zone 6 points 1 month ago (1 children)

I'm maxed out on open source contributions myself right now as maintainer of a large project

[–] MachineFab812@discuss.tchncs.de 2 points 1 month ago

... and I've been told I'm demanding and entitled, but here's some jackass who downvoted one(@ryannathans) who is doing the work. You or I can never do enough to be worthy to request certain features or bug-fixes be given higher priority.

These people need to go back to Spez's, Musk's, or Zuck's playground, since they love having no say so much.

[–] yeehaw_cosmonaut@reddthat.com 8 points 1 month ago (1 children)

Cool feature, I wonder if a duress fingerprint will be introduced in the future?

[–] Jolteon@lemmy.zip 30 points 1 month ago (1 children)

I feel like that would be a lot easier to accidentally trigger.

[–] yeehaw_cosmonaut@reddthat.com 4 points 1 month ago (1 children)

You're not wrong, but like the duress pin, it would be a nice feature to have. Not everyone would have to set a duress fingerprint, just the people who find value in it.

[–] Kayel@aussie.zone 6 points 1 month ago (1 children)

You would not believe how much I have lost from being obsessed with high-threat modeling for my low-threat life. $10k and family videos for a start.

Sometimes it's a good idea to protect the community from itself lol.

[–] laughterlaughter@lemmy.world 1 points 1 month ago (1 children)

Don't leave us hanging. How did it happen?

[–] Kayel@aussie.zone 4 points 1 month ago (1 children)

Writing down a crypto wallet key in a self hosted password manager on a highly encrypted self hosted drive which degraded. Pretty much the same with the photos, if I didn't encrypt my backups I would have been able to recover more files.

[–] laughterlaughter@lemmy.world 1 points 1 month ago

Oh yikes.

I got out of crypto stuff long ago. But I was so paranoid with losing wallet keys that I'd put them everywhere in chunks, like a medieval quartered body spread all over Scotland.

[–] refalo@programming.dev 7 points 1 month ago (3 children)

something something destruction of evidence

[–] autonomoususer@lemmy.world 19 points 1 month ago* (last edited 1 month ago)

What evidence?

[–] Jolteon@lemmy.zip 7 points 1 month ago* (last edited 1 month ago)

Alternately, it could unlock the phone while also erasing specific parts of it, like message history and call logs, potentially replacing them with something you'd set up previously.

Edit: and obviously it would disable the duress pin and set the unlocking pin to it.

[–] DetectiveSanity@lemmy.world 3 points 1 month ago

Depends on what you did! Say for example they're using Graphene to harass/paedophilia then they already have a copious amount of evidence on hand since they are there.

For organising peaceful protests that seems less of an issue and the other end of the chats is the weak link.

[–] sic_semper_tyrannis@lemmy.today 4 points 1 month ago