295
submitted 9 months ago by L4s@lemmy.world to c/technology@lemmy.world

Utah Supreme Court says suspects can refuse to hand over phone passwords to the police | Other state Supreme Courts disagree and the case would wind up before the US Supreme Court::undefined

you are viewing a single comment's thread
view the rest of the comments
[-] rickdg@lemmy.world 57 points 9 months ago

We need some kind of multi-account that loads up according to what password gets used. I wouldn’t be surprised if this is something that already exists in rooted androids.

[-] Scirocco@lemm.ee 17 points 9 months ago

I've mulled/wished for this for years. Also useful at borders, where in the past I have actually been asked (required) to unlock phones and laptops. Generally you have no rights whatsoever there.

Those shadow accounts would need to be 'lived in' to pass those border checks. My worst experience was traveling with new, obviously burner devices


border agents were extremely suspicious.

[-] scarilog@lemmy.world 2 points 9 months ago

Country borders? If so, what countries?

[-] Scirocco@lemm.ee 1 points 9 months ago

Virtually every international border on the planet.

[-] scarilog@lemmy.world 1 points 9 months ago

Well that's just not true I've crossed international borders before and have never had to do this.

[-] Buttons@programming.dev 12 points 9 months ago* (last edited 9 months ago)

I forgot what it was called, but someone create an encrypted file system where you could never be certain all files were decrypted. You could enter one password and files A B and C would be revealed and accessible, then you could enter another password and files D E and F would be revealed, and again, another password would reveal file G, etc.

The file system was just a big blob of seemingly random bytes, but when processed with the right password, certain patterns would be revealed, those patterns being the files. This brought with it the possibility that files would be lost, because when writing files with password 1, files encrypted with password 2 might be overwritten. Several copies of each file were stored to protect against this, but you could still lose files.

There are some philosophical / legal issues with such a file system, because you can never prove that you've decrypted all the files. If prosecutors wanted to claim that you had more files on the filesystem, there's no way you could disprove it, because you can never prove that you've decrypted everything. Hopefully people would be considered innocent until proven guilty, but believing the law always works that way is naive.

EDIT: It's called deniable encryption: https://en.wikipedia.org/wiki/Deniable_encryption

[-] uriel238@lemmy.blahaj.zone 2 points 9 months ago

Multi-account encryption has been around since at least the aughts and is readily available for those who are privacy conscious enough to find it out.

Much of the effort is to educate the average Joe that they need to be exactly that privacy conscious.

[-] Classy@sh.itjust.works 11 points 9 months ago

I used to have an android launcher years back that did just that thing, actually. It ran different instances of the home page based on what password you entered. You could access other instances when logged in via a 3-finger side drag, but it was able to be disabled. I don't recall what it was called anymore but I had to have been using it back when I had a Galaxy S8 or even older.

[-] Classy@sh.itjust.works 9 points 9 months ago

Somewhat related, the app LockMyPix is a pretty decent media organizer and encrypter for Android, and it allows for multiple distinct vaults to store images and video in. One password for Vault A, another for Vault B, etc

[-] assembly@lemmy.world 10 points 9 months ago

I had something similar on my laptop with encrypted volumes and duress passwords. So my documents folders were all on an encrypted volume and opened by the standard super hard password. The duress password was much easier and contained a skeleton structure to look legit. The idea was that if anyone brute forced the password it would just find the duress folder first and hopefully no one would look further. Seems like overkill but I was traveling to China for business so necessary. I did however use a burner phone as opposed to my real cell.

[-] misanthropy@lemm.ee 8 points 9 months ago

No, but there is at least one app out there that lets you set a panic code that will wipe the phone when used

[-] ABCDE@lemmy.world 4 points 9 months ago

There is one which already exists like this, I think it was on the Mozilla phone.

[-] AnonStoleMyPants@sopuli.xyz 3 points 9 months ago

I doubt that's how the password is used for. More like they copy all contents of the phone and ask the password to go through encryption. The data is already there, accounts don't matter.

This is also the reason why it's no good to have a dead man's switch or the like, as in a certain password just wipes everything. You'd just get arrested for destroying evidence and they continue from a copy.

[-] Crashumbc@lemmy.world 2 points 9 months ago

Yeah, pretty much any first year police IT is going to make an exact copy of the phone first.

this post was submitted on 17 Dec 2023
295 points (98.7% liked)

Technology

58143 readers
4463 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS