this post was submitted on 01 Feb 2026
21 points (100.0% liked)

Privacy

3616 readers
128 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] just2look@lemmy.zip 12 points 1 day ago (1 children)

If you're comparing stock OS vs Lineage, the password length doesn't really matter. The issue would be vulnerabilities introduced by having an unlocked bootloader, or security updates that haven't been applied to Lineage OS.

Also its hard to answer what 'police' can do because that varies widely depending on which LE you're dealing with. Basically any data can be retrieved given enough time and resources. So the this all depends on what your threat landscape looks like.

[–] DeathByBigSad@sh.itjust.works 2 points 1 day ago (2 children)

So here are the senarios I've come up with:

  1. Phone is on latest security updates
  2. Latest security update for LineageOS itself but outdated firmware (like the firmware code that only the manufacturer can patch)
  3. Outdated Lineage OS, but the phone is in "Before First Unlock" mode (and assuming they didn't manage to send you a Pegasus beforehand)
[–] just2look@lemmy.zip 5 points 1 day ago (1 children)

I am no expert on lineage, so take this all with a grain of salt. You being fully updated on lineage doesn't necessarily mean you have all security updates. The OS maintainers will take time to implement fixes after vulnerabilities are reported, and there may be a delay even if google has patched core android. Manufacturers have that same issue however, so this isn't unique to Lineage.

The bootloader being unlocked will always be a weak point, and last I looked into it most phones don't allow for the bootloader to be locked after unlocking.

Having your software and firmware up to date is always going to be a good idea. And if you're expecting to go somewhere that you might be detained (protests/demonstrations) then it might be a good idea to just not bring the phone at all. Physical access to a device offers significantly more options for pulling data from the device.

Not bringing a phone to a protest is a govts wet dream. Bring a burner phone. The real issue, assuming signal jamming, is how to propagate video chunks thru a mesh network until node(s) find working Internet connection(s) and the video chunks can be distributed out to multiple servers.

Also would be nice to be connected to coordinators to break up mob into cells with distributed specific targets.

Why do we have to suck at what we do?

Seeing police with riot gear in a phalanx, and crowds pushed against them. Looks like failure to me; lost opportunity. Where in da f are the coordinators?

[–] Technikus5@feddit.org 2 points 1 day ago

I can remember back from my more experimental days, the moment your bootloader is unlocked, your phone is wide open to a lot of mischief and attacks. Meaning if you have to leave your bootloader unlocked to use a custom ROM, it's probably not ideal.

On the other hand, your manufacturers OS might have some intentional backdoors, or just insecurities in some of the OEM apps, that make it easier to exploit, but that's obviously hard to say/check.

From my quick search, it looks like it might be possible to re-lock your bootloader with certain manufacturers of you have the right signing keys, but that's definitely some advanced level fingerling at that point: https://www.reddit.com/r/LineageOS/comments/n7yo7u/a_discussion_about_bootloader_lockingunlocking/