this post was submitted on 01 Feb 2026
20 points (100.0% liked)

Privacy

3616 readers
125 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
top 16 comments
sorted by: hot top controversial new old
[–] ultranaut@lemmy.world 24 points 1 day ago

They can likely still get in. There's leaked slides from Cellebrite showing everything they can crack and under what circumstances. From what I remember GrapheneOS is really the only version of Android they actually can't get into.

[–] lambalicious@lemmy.sdf.org 6 points 1 day ago

The moment the cops get physical access to the device it should be considered compromised, regardless of you have Graphene, Bismuth, Borophene or whatever. Since if they (the cops) are any well-equipped, they'll just disassemble the phone and proceed to make a copy of the raw memory as-is, then take all the time they have in the world to work on breaking through the copy rather than directly on the phone (and risk eg.: a duress key activation). Rinse, wench, repeat.

(I do get that Lineage requires having a bootloader unlocked which is usually non-relockable. But that's just the breaks. Neither Graphene nor relockable phones are common enough to account for the amount of people who would or might have to protest)

[–] just2look@lemmy.zip 12 points 1 day ago (1 children)

If you're comparing stock OS vs Lineage, the password length doesn't really matter. The issue would be vulnerabilities introduced by having an unlocked bootloader, or security updates that haven't been applied to Lineage OS.

Also its hard to answer what 'police' can do because that varies widely depending on which LE you're dealing with. Basically any data can be retrieved given enough time and resources. So the this all depends on what your threat landscape looks like.

[–] DeathByBigSad@sh.itjust.works 2 points 1 day ago (2 children)

So here are the senarios I've come up with:

  1. Phone is on latest security updates
  2. Latest security update for LineageOS itself but outdated firmware (like the firmware code that only the manufacturer can patch)
  3. Outdated Lineage OS, but the phone is in "Before First Unlock" mode (and assuming they didn't manage to send you a Pegasus beforehand)
[–] just2look@lemmy.zip 5 points 1 day ago (1 children)

I am no expert on lineage, so take this all with a grain of salt. You being fully updated on lineage doesn't necessarily mean you have all security updates. The OS maintainers will take time to implement fixes after vulnerabilities are reported, and there may be a delay even if google has patched core android. Manufacturers have that same issue however, so this isn't unique to Lineage.

The bootloader being unlocked will always be a weak point, and last I looked into it most phones don't allow for the bootloader to be locked after unlocking.

Having your software and firmware up to date is always going to be a good idea. And if you're expecting to go somewhere that you might be detained (protests/demonstrations) then it might be a good idea to just not bring the phone at all. Physical access to a device offers significantly more options for pulling data from the device.

Not bringing a phone to a protest is a govts wet dream. Bring a burner phone. The real issue, assuming signal jamming, is how to propagate video chunks thru a mesh network until node(s) find working Internet connection(s) and the video chunks can be distributed out to multiple servers.

Also would be nice to be connected to coordinators to break up mob into cells with distributed specific targets.

Why do we have to suck at what we do?

Seeing police with riot gear in a phalanx, and crowds pushed against them. Looks like failure to me; lost opportunity. Where in da f are the coordinators?

[–] Technikus5@feddit.org 2 points 1 day ago

I can remember back from my more experimental days, the moment your bootloader is unlocked, your phone is wide open to a lot of mischief and attacks. Meaning if you have to leave your bootloader unlocked to use a custom ROM, it's probably not ideal.

On the other hand, your manufacturers OS might have some intentional backdoors, or just insecurities in some of the OEM apps, that make it easier to exploit, but that's obviously hard to say/check.

From my quick search, it looks like it might be possible to re-lock your bootloader with certain manufacturers of you have the right signing keys, but that's definitely some advanced level fingerling at that point: https://www.reddit.com/r/LineageOS/comments/n7yo7u/a_discussion_about_bootloader_lockingunlocking/

[–] kittenzrulz123@lemmy.dbzer0.com 4 points 1 day ago (1 children)

I would personally argue Lineageos is significantly less safe and private than the OEM rom. If you're using a phone with LineageOS and an unlocked bootloader (which is basically needed for lineageos) it would bearly even be an inconvenience for them to bypass the OS entirely and just get all your data. Comparatively most stock rims are also pretty easy to hack into for any law enforcement with resources.

Tldr: Use grapheneos

[–] DeathByBigSad@sh.itjust.works 1 points 1 day ago* (last edited 1 day ago) (1 children)

Okay but suppose you managed to turn off the phone before they seize it, how does the unlocked bootloader matter? LineageOS use encryption

Isn't most people running linux with secure-boot off anyways? But a turned-off fde encrypted linux computer is still considered secure?

[–] kittenzrulz123@lemmy.dbzer0.com 2 points 23 hours ago

A lot of people wont like this but Linux isn't secure either

[–] BigBolillo@mgtowlemmy.org 5 points 1 day ago* (last edited 1 day ago) (1 children)

My take would be using grapheneos and give the duress pin when asked for it, that way if they put the pin the entire phone gets wiped.

I know I'm not answering your question directly but if you use lineageos with an unlocked bootloader the best you can do is deny to give the passcode but eventually depending on their resources they will get in.

[–] just2look@lemmy.zip 3 points 1 day ago (1 children)

That may not be the best advice. It might get you charged with destroying evidence. If you have graphene and its locked down, then your best bet is probably just to hope you and your device are out before they can pull anything from it.

[–] BigBolillo@mgtowlemmy.org 4 points 1 day ago (1 children)

If you have something highly illegal in your device I think it is better to be charged for destroying evidence than something worse or even if the police find something that can get you in trouble with someone worse than them.

[–] just2look@lemmy.zip 5 points 1 day ago

Totally fair. So I guess make the judgment based on the lesser of two evils there.

[–] ken@discuss.tchncs.de 2 points 1 day ago* (last edited 1 day ago)

Maybe. But be careful about putting in that PIN or connecting it to your network when you get home, in case you get it back after...

There is no security using LineageOS. Next!