this post was submitted on 23 Mar 2025
344 points (99.4% liked)

Privacy

2030 readers
116 users here now

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be civil and no prejudice
  2. Don't promote big-tech software
  3. No reposting of news that was already posted
  4. No crypto, blockchain, NFTs
  5. No Xitter links (if absolutely necessary, use xcancel)

Related communities:

Some of these are only vaguely related, but great communities.

founded 5 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 44 points 1 month ago* (last edited 1 month ago) (10 children)

I need an android phone that logs me into one fake version of the operating system when I unlock it with one pattern, and another OS when I use my real pattern.

Like a virtual machine kind of deal where the attacker cannot know that there are other logins, or how many. Preferably with some kind of automated system that simulates normal usage so it looks real but boring.

[–] [email protected] 17 points 1 month ago (4 children)

The novel Little Brother by Cory Doctorow comes to mind.

One PIN would log you into your real account, another PIN into a decoy account, and no indication of the other one existing.

That does not exist in the real world.

[–] [email protected] 24 points 1 month ago

This is called plausibly deniable encryption, though you cannot hide the presence of the system itself.

GrapheneOS has a Duress PIN feature, which wipes your phone if entered.

load more comments (3 replies)
load more comments (8 replies)