The recent federal raid on the home of Washington Post reporter Hannah Natanson isn’t merely an attack by the Trump administration on the free press. It’s also a warning to anyone with a smartphone.

Included in the search and seizure warrant for the raid on Natanson’s home is a section titled “Biometric Unlock,” which explicitly authorized law enforcement personnel to obtain Natanson’s phone and both hold the device in front of her face and to forcibly use her fingers to unlock it. In other words, a judge gave the FBI permission to attempt to bypass biometrics: the convenient shortcuts that let you unlock your phone by scanning your fingerprint or face.-

It is not clear if Natanson used biometric authentication on her devices, or if the law enforcement personnel attempted to use her face or fingers to unlock her devices. Natanson and the Washington Post did not respond to multiple requests for comment. The FBI declined to comment.

  • this@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    33
    arrow-down
    1
    ·
    12 hours ago

    Even better, set it to 1234567890 or 00000000 or similar easy to guess pin, and change it to the length of your actual pin, now if someone tries to bruteforce your phone it will instantly wipe and you can make a case that it was the law enforcement who destroyed any “evidence” by their own actions if in comes up In court.

      • FirstCircle@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        5 hours ago

        You mean you’re not having your photos automatically, immediately encrypted and backed up on remote servers? ente.io will do that for you and their free plan comes with 10G of storage which is quite a few pics.

          • this@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            9
            ·
            10 hours ago

            Your backups aren’t nearly as likely to be subject to an immediate civil forfiture as a phone is. Cops don’t need a judicial warrent to take your phone, but they do need one to search your home legally, and if you do your offsite backups in another country, they would need the cooperation of the local authorities of that country. Strong encryption can provide a relatively safe barrier for offsite backups.

            Also, it’s possible to have some things that may only exist on your phone and not your server/backup system(easy biometric unlock for a password manager, or encrypted chat logs, to name a few examples).

        • partofthevoice@lemmy.zip
          link
          fedilink
          arrow-up
          10
          ·
          edit-2
          10 hours ago

          Actually, these tips are for every day people (just not people whose kids can get to their phones). High targets get their ram frozen with liquid nitrogen, their PSU spliced into a battery pack, and the entire system-state backed up for retries.

    • spizzat2@lemmy.zip
      link
      fedilink
      arrow-up
      9
      ·
      11 hours ago

      Don’t they make a copy of the phone before they go about trying to unlock it?

      This kind of security is only going to work against a careless or incompetent atta-- oh. I see…

        • partofthevoice@lemmy.zip
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          10 hours ago

          Not for state sponsored campaigns. They’ll cut the damn chips from your phone and send signals directly to the individual pins if they have to. They’ll freeze your ram into super cold state to make it nonvolatile. They’ll do some crazy shit, man.

    • FudgyMcTubbs@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      23
      ·
      11 hours ago

      Holy Christ, what are you guys doing on your phones to fuel this much paranoia? I have a constitutional right to privacy and i dont want my information/data (the very essence that makes me me) harvested and sold – for those reasons im opposed to most searches and i’ve never used biometrics. But the need to nuke my phone because a cop got it is so far from a necessity that I cant think of what im doing that I would need it.

      • arthur@lemmy.zip
        link
        fedilink
        English
        arrow-up
        16
        ·
        9 hours ago

        In a situation where you are raided like the journalist, it may be worth nuking the phone. Consider the sources that could be exposed.

        Having your phone available to law enforcement is the equivalent of forfeit your right to remain silent.

        And more, once they have access, what is stopping them from planting false evidence? In this fascist fever that US is living… I would prefer to avoid the risks.

      • this@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        19
        ·
        edit-2
        10 hours ago

        Other than literally everything I think and feel you mean? I think it’s perfectly reasonable to not want to allow police or especially federal agents into my own head. My note taking apps, my password manager which links to all of my online accounts, and my entire web browsing and search history are all linked through my phone. Also signal and discord and lemmy, and on and on…

        • FauxLiving@lemmy.world
          link
          fedilink
          arrow-up
          8
          ·
          edit-2
          9 hours ago

          Exactly this.

          Read about the Hawthorne effect: https://en.wikipedia.org/wiki/Hawthorne_effect and how people change their behaviors when they are being observed. Being free of observation is vital to being able to think your own thoughts without outside influence.

          If the problem is with the usage framing the hypothetical adversary as a country’s law enforcement, pretend you live in a cyber North Korea and have a cellphone. The idea of an adversary is just a means of thinking about the problem. You want to build a system so that they can’t capture your flag (your flag being some digital information that you want private).


          Whatever the opposite of TL;DR is:

          It isn’t intended to be read as ‘do this to avoid law enforcement so you can do crimes’.

          When thinking about security/privacy (same thing), you don’t know what kind of attack you may eventually have to defend against, maybe you have a partner who has decided to stalk you and so they screen read your PIN or a strong arm robbery where they’ll try to use your phone to access your bank.

          Instead of trying to imagine every single possible scenario, you imagine one model scenario. In this model scenario, the adversary has every possible capability that is available and your goal is to keep your flag safe, or be able to pass a flag between two people without it being seen, or various other scenarios (which are themselves just model problems of types of system that you need to secure).

          This hypothetical adversary, in order to have these capabilities in real life, would be the equivalent of a sovereign nation with unlimited funding and access to all technologies that are possible (and some that are only hypothetical). This description fits one country pretty well and so, as shorthand, people often just write ‘the feds’. I guess they could also write ‘Eve’ but that is a specific adversary in one kind of scenario and not the general Adversary.