With reports that the witnesses in today’s murder by ICE were all detained (and their phones presumably confiscated), I’ve been thinking nonstop about if I were to record ICE or the cops doing something, how could I ensure that any videos I record are not able to be deleted, assuming my phone was confiscated? I’m talking about specific tactics.

My phone runs iOS. I already have a strong passcode which hopefully makes brute forcing difficult. I use ADP and the only thing I back up automatically are photos and videos. In theory, I think my setup is fairly secure, since it would be hard to get into my phone or my iCloud account. But I don’t know what vulnerabilities or tools I may be missing.

I’m asking for iOS, but I think it’s good to discuss Android and GrapheneOS as well.

    • √𝛂𝛋𝛆@piefed.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 hours ago

      I was looking for the image to see if I saved it, but apparently not. There was a image floating around of a private meeting slide presentation that showed the various phones and their vulnerabilities. IIRC, the main things were some issue with the number of allowed log in attempts when all the mobile devices are in the initial boot lock versus regular lock state. The other was how the default USB behavior is handled in the locked state. These are default locked down in Graphene. Additionally, there are tools like a second lock screen password that factory resets the device completely in the background, and automatic reboots so that the phone goes into the initial boot locked state regularly.

      If they can’t get into the device, they will probably just steal it.