Police HATE That They Can't Hack These Smartphones

00:09:41
https://www.youtube.com/watch?v=HIkBIfst8oA

Zusammenfassung

TLDRThe video emphasizes the benefits of using Android, particularly Google Pixel phones, for enhanced privacy and security, especially with the installation of Graphene OS. It discusses the current situation in Catalina, where law enforcement is ramping up surveillance efforts against suspected drug-related activities. Graphene OS allows users to modify their devices for better privacy, including features like duress pins and multi-profile access to protect sensitive data. The speaker encourages viewers to consider Graphene OS to safeguard their privacy against increasing police scrutiny and surveillance.

Mitbringsel

  • 📱 Android is recommended for its flexibility and customization.
  • 🔒 Graphene OS enhances privacy and security on Pixel phones.
  • 👮‍♂️ Law enforcement in Catalina conducts mass surveillance.
  • 🛡️ Graphene OS limits app tracking and data extraction.
  • 🔑 Duress pin feature can wipe the device under coercion.
  • 🔄 Rebooting a phone increases security against hacking.
  • 🔍 AFU and BFU modes affect data extraction success.
  • 🛠️ Multi-profile feature allows for data separation.
  • 📞 Encrypted communication apps improve privacy.
  • 🚀 Installing Graphene OS is a proactive step for privacy.

Zeitleiste

  • 00:00:00 - 00:09:41

    The speaker recommends Android smartphones, particularly Google Pixel, for their flexibility and privacy features, despite iOS being more secure. They highlight the ability to gain root access and remove pre-installed Google services for better privacy. In Catalina, police are intensifying their surveillance efforts in the war on drugs, leading to increased digital security measures among unlicensed pharmaceutical distributors, including the use of Graphine OS, a custom ROM that enhances privacy and security on Pixel devices. Graphine OS limits tracking and data extraction, frustrating law enforcement's attempts to access user data. The speaker discusses the implications of police searches of smartphones, emphasizing the importance of keeping devices in a secure state to prevent data extraction. Graphine OS features, such as automatic reboots and duress pins, provide additional layers of security against unauthorized access. The speaker concludes by encouraging viewers to consider installing Graphine OS for enhanced privacy and to be aware of police surveillance practices.

Mind Map

Video-Fragen und Antworten

  • What is Graphene OS?

    Graphene OS is a custom ROM for Pixel phones that enhances privacy and security.

  • Why is Android recommended over iOS?

    Android, especially on Google Pixel, is less locked down, allowing for more customization and privacy options.

  • How does Graphene OS improve privacy?

    It limits app tracking, provides granular access controls, and has features to protect against data extraction.

  • What is the duress pin feature?

    A secondary pin that wipes the device if entered, useful in situations of coercion.

  • How does law enforcement target smartphone users?

    They conduct mass surveillance and may profile individuals based on their smartphone type.

  • What happens if a phone is rebooted?

    Rebooting puts the phone in a more secure mode, making data extraction harder.

  • Can Graphene OS prevent police from accessing my data?

    Yes, it has several features designed to protect user data from unauthorized access.

  • What is the significance of AFU and BFU modes?

    AFU mode allows easier data extraction, while BFU mode is more secure and harder to hack.

  • How can I enhance my smartphone's privacy?

    Consider installing Graphene OS and using encrypted communication apps.

  • What should I do if I want better privacy on my phone?

    Install Graphene OS for enhanced privacy and security features.

Weitere Video-Zusammenfassungen anzeigen

Erhalten Sie sofortigen Zugang zu kostenlosen YouTube-Videozusammenfassungen, die von AI unterstützt werden!
Untertitel
en
Automatisches Blättern:
  • 00:00:00
    When it comes to smartphones, I
  • 00:00:01
    generally recommend Android. Not because
  • 00:00:03
    they provide better privacy and
  • 00:00:04
    security. I think that title actually
  • 00:00:06
    goes to iOS when compared to vanilla
  • 00:00:08
    Android. But the real reason I recommend
  • 00:00:10
    it, especially on a Google Pixel, is
  • 00:00:13
    because of the fact that the OS is less
  • 00:00:14
    locked down in that implementation. You
  • 00:00:17
    can gain root access to your device and
  • 00:00:19
    modify any of the system files. And you
  • 00:00:21
    can deleg your phone, which means
  • 00:00:23
    removing every single pre-installed
  • 00:00:24
    Google service from it, giving you much
  • 00:00:26
    better privacy. And you can even swap
  • 00:00:28
    out the entire operating system for
  • 00:00:31
    something different without having to
  • 00:00:32
    leave the bootloadader unlocked. But
  • 00:00:34
    imagine if just having a Google Pixel
  • 00:00:37
    phone resulted in you getting harassed
  • 00:00:40
    by your local police. Because the moment
  • 00:00:42
    they see you answer a call or send a
  • 00:00:43
    text on it, they assume that you must be
  • 00:00:46
    a criminal attempting to contact your
  • 00:00:48
    fellow criminal associates. Well, this
  • 00:00:50
    is actually the reality right now in
  • 00:00:52
    Catalina. The national police there have
  • 00:00:55
    been ramping up their war on drugs. And
  • 00:00:57
    in the age of smartphones, most of this
  • 00:01:00
    warfare is conducted in the digital
  • 00:01:02
    space by the police conducting mass
  • 00:01:05
    online surveillance of people and even
  • 00:01:07
    attempting to hack into suspects and
  • 00:01:10
    their associates devices with malware.
  • 00:01:12
    So, of course, the unlicensed
  • 00:01:14
    pharmaceutical distributors in Catalina
  • 00:01:17
    started stepping up their digital
  • 00:01:18
    security by using encrypted
  • 00:01:20
    communication apps and even going so far
  • 00:01:23
    as to install Graphine OS on their Pixel
  • 00:01:27
    phones. Now, in case you didn't know,
  • 00:01:29
    Graphine OS is a custom ROM that you can
  • 00:01:31
    install pretty much just exclusively on
  • 00:01:34
    Pixel phones, which improves the privacy
  • 00:01:37
    and security of that Android
  • 00:01:39
    implementation from the bottom up. And
  • 00:01:42
    frankly, it creates one of the most
  • 00:01:44
    secure smartphones that a civilian can
  • 00:01:46
    easily get in their hands. Way more
  • 00:01:48
    private and secure than even an iPhone.
  • 00:01:51
    Graphine OS also provides a lot of
  • 00:01:54
    tracking mitigations by limiting the
  • 00:01:56
    fingerprinting capability of apps. And
  • 00:01:59
    Graphine OS is completely deooled. So, a
  • 00:02:02
    lot of that tracking information from
  • 00:02:04
    things like Google Maps, Google Chrome,
  • 00:02:07
    the Google search engine that police
  • 00:02:10
    agencies around the world rely on to
  • 00:02:11
    track people just isn't available if
  • 00:02:14
    you're using Graphion OS. There's lots
  • 00:02:17
    of granular settings to control what
  • 00:02:19
    apps are able to access on your phone.
  • 00:02:21
    And Graphine OS provides dozens of user
  • 00:02:24
    profiles that you can use to further
  • 00:02:26
    separate what data your apps have access
  • 00:02:29
    to. and law enforcement are particularly
  • 00:02:32
    frustrated with Graphine OS's
  • 00:02:34
    mitigations against both consensual and
  • 00:02:37
    non-consentual data extractions. Now, I
  • 00:02:39
    don't really know much about this
  • 00:02:41
    country's laws or how their law
  • 00:02:42
    enforcement operates, but here in the
  • 00:02:44
    United States, if you're arrested or
  • 00:02:47
    even if you're detained for an
  • 00:02:49
    investigation by the police, there's a
  • 00:02:51
    good chance that they're going to want
  • 00:02:53
    to go through your phone if they think
  • 00:02:55
    that it contains any evidence of a
  • 00:02:57
    crime. And like I said, we're in a
  • 00:02:58
    digital age. So obviously, a lot of
  • 00:03:00
    criminals are using their phones in the
  • 00:03:03
    process of doing crime. Now, with a
  • 00:03:06
    consentbased search, as it's called, the
  • 00:03:09
    police are going to ask you to enter the
  • 00:03:11
    code on your phone and unlock it for
  • 00:03:13
    them. Uh, but of course, if you have
  • 00:03:16
    thumbrint unlock or Face ID enabled,
  • 00:03:19
    then there's a good chance that the
  • 00:03:20
    police can force you to unlock the phone
  • 00:03:23
    that way by just scanning your face or
  • 00:03:25
    maybe uh getting your fingerprint if
  • 00:03:27
    you're in handcuffs. But if you don't
  • 00:03:29
    have biometrics and you refuse to unlock
  • 00:03:32
    your phone, then the police are going to
  • 00:03:35
    seize it from you and probably arrest
  • 00:03:37
    you as well. and back at their
  • 00:03:39
    headquarters or in a mobile forensic
  • 00:03:41
    unit, they're going to connect your
  • 00:03:43
    phone to a device that's going to
  • 00:03:44
    attempt to hack into it and extract all
  • 00:03:48
    of the data from your phone and then
  • 00:03:50
    they'll be able to see everything that
  • 00:03:52
    you had on it. Now, the success of this
  • 00:03:55
    data extraction mostly relies in keeping
  • 00:03:58
    the phone in its after first unlock or
  • 00:04:01
    AFU mode. This is the setting that
  • 00:04:04
    phones are pretty much always in unless
  • 00:04:06
    you power them off or you reboot the
  • 00:04:08
    phone. And in this state, in the AFU
  • 00:04:11
    state, the decryption keys for your
  • 00:04:13
    phone's file system are saved in its
  • 00:04:16
    RAM. And so with CellBright's hacking
  • 00:04:18
    tools that they provide to law
  • 00:04:20
    enforcement, they're able to most of the
  • 00:04:23
    time recover that data um from most
  • 00:04:26
    phone models that are in the AFU mode.
  • 00:04:29
    But once a device is rebooted and then
  • 00:04:31
    before the PIN code is put into it, the
  • 00:04:34
    phone is in what's called before first
  • 00:04:37
    unlock or BFU mode. Biometric unlock
  • 00:04:40
    usually gets disabled in BFU mode and
  • 00:04:42
    the encryption keys are not saved into
  • 00:04:45
    the devices RAM. So the attack surface
  • 00:04:47
    is much smaller. And typically the only
  • 00:04:50
    way to reliably get data off a phone in
  • 00:04:53
    this mode is to guess the PIN. And the
  • 00:04:56
    secure element that's in more modern
  • 00:04:58
    smartphones makes that brute forcing
  • 00:05:01
    process much much harder. Graphine OS
  • 00:05:05
    has a feature that automatically reboots
  • 00:05:07
    your phone every 18 hours enabled by
  • 00:05:10
    default which puts it into the before
  • 00:05:13
    first unlock mode. Newer versions of
  • 00:05:15
    vanilla Android also have a similar
  • 00:05:17
    feature, but it's not enabled by
  • 00:05:19
    default. And I think when you do enable
  • 00:05:22
    it by default, it only reboots your
  • 00:05:24
    phone every 3 days or so. Uh so anyway,
  • 00:05:27
    if you're using Graphine OS and you
  • 00:05:30
    haven't gone out of your way to turn off
  • 00:05:33
    that security setting, then the police
  • 00:05:35
    are going to have 18 hours at best to
  • 00:05:38
    try and hack into your phone and try to
  • 00:05:40
    extract the encryption keys from RAM
  • 00:05:43
    before it reboots. And then this process
  • 00:05:45
    becomes pretty much impossible. Graphine
  • 00:05:47
    OS also disables USBC connections and
  • 00:05:50
    data transfers from new devices until
  • 00:05:53
    the phone is unlocked and the connection
  • 00:05:56
    is allowed. So those mitigations would
  • 00:05:59
    also have to be bypassed before the
  • 00:06:01
    Cellbrite can even start trying to hack
  • 00:06:04
    into Graphine. Now for the so-called
  • 00:06:06
    consensual data extractions where you
  • 00:06:08
    give up your phone password to the
  • 00:06:10
    police or unlock it for them possibly
  • 00:06:12
    under duress. Graphine OS has a
  • 00:06:15
    mitigation for that which is very
  • 00:06:17
    appropriately called duress pin.
  • 00:06:20
    Essentially this is a secondary pin that
  • 00:06:22
    you can enter on the unlock screen that
  • 00:06:25
    will wipe your device and any eims that
  • 00:06:28
    are installed into it. And if you do use
  • 00:06:31
    fingerprint unlock, then graph OS limits
  • 00:06:34
    the number of attempts to five. So you
  • 00:06:37
    have a much better chance of doing five
  • 00:06:40
    false unlocks like using the wrong
  • 00:06:42
    fingers or maybe if you've got your
  • 00:06:44
    hands behind your back and police are
  • 00:06:46
    trying to force you to unlock it, you
  • 00:06:47
    can, you know, either present the wrong
  • 00:06:49
    finger or maybe just mess it up enough
  • 00:06:51
    to get it to disable fingerprint unlock
  • 00:06:54
    and then require the PIN. Whereas in
  • 00:06:56
    vanilla Android, I think you get 20 or
  • 00:06:59
    so attempts. So yeah, obviously five is
  • 00:07:02
    going to be much more secure. The
  • 00:07:03
    multi-profile feature also allows you to
  • 00:07:06
    log into one profile without decryting
  • 00:07:08
    any data for another. So, you could have
  • 00:07:10
    a decoy profile that doesn't have any
  • 00:07:13
    sensitive data on it that you unlock
  • 00:07:15
    instead as a way to comply with a
  • 00:07:18
    warrant or, you know, comply with your
  • 00:07:20
    password being requested under duress
  • 00:07:22
    without actually giving up any
  • 00:07:24
    incriminating evidence. However, if the
  • 00:07:27
    phone does end up getting rebooted, then
  • 00:07:29
    the admin profile actually does need to
  • 00:07:31
    be logged into before any other profile
  • 00:07:34
    can be logged into. So, graphine OS
  • 00:07:37
    along with good opsac really gives you a
  • 00:07:40
    major privacy and security boost. So
  • 00:07:42
    much so to the point that law
  • 00:07:44
    enforcement agents are starting to
  • 00:07:46
    profile people just based on the type of
  • 00:07:48
    smartphone they choose to use. And
  • 00:07:50
    obviously from a distance, the cops
  • 00:07:52
    can't tell if you're using graphine OS
  • 00:07:55
    or Lineage OS or anything else. They
  • 00:07:57
    would actually have to get up close and
  • 00:07:59
    personal to verify that. And I'm sure
  • 00:08:01
    that nine times out of 10 people in
  • 00:08:03
    Catalina are just using stock Android on
  • 00:08:07
    their Google Pixels. But imagine how
  • 00:08:09
    triggered the police over there would be
  • 00:08:11
    if they actually did start discovering
  • 00:08:14
    Graphun OS every single time or at least
  • 00:08:17
    most of the time that they just talked
  • 00:08:18
    to any run-of-the-mill Pixel user.
  • 00:08:21
    Imagine you have two phones and you're
  • 00:08:24
    trying to do a side-by-side comparison
  • 00:08:25
    of a regular Pixel phone that's running
  • 00:08:28
    stock vanilla Android and then one
  • 00:08:30
    running graphine OS. The police over
  • 00:08:32
    there might actually think that you're
  • 00:08:33
    Pablo Escobar. So, I guess that that's a
  • 00:08:36
    great way to troll police who don't want
  • 00:08:37
    the citizens of their country to have
  • 00:08:39
    any decent privacy. Get a second Pixel
  • 00:08:42
    phone and just casually install Graphine
  • 00:08:44
    OS on it. Use it as like a portable MP3
  • 00:08:46
    player or whatever. Just just use it.
  • 00:08:49
    And you know what? If you really want to
  • 00:08:50
    mess with them, install Signal on it,
  • 00:08:52
    too, and just occasionally text yourself
  • 00:08:54
    on Signal and give yourself a username
  • 00:08:57
    on there. That sounds like some sort of
  • 00:08:59
    drug kingpen. That's probably the best
  • 00:09:01
    way to speedrun going to jail in
  • 00:09:03
    Catalina. But unironically, you should
  • 00:09:06
    install Graphine OS on your phone if you
  • 00:09:08
    want to have better privacy, and you
  • 00:09:10
    just don't want the police to be
  • 00:09:11
    actively scanning what you're doing and
  • 00:09:14
    monitoring and tracking you because
  • 00:09:16
    they're literally doing that to
  • 00:09:17
    everybody. It's not even people who are
  • 00:09:18
    suspects, just tracking where everybody
  • 00:09:21
    goes and then they filter out suspects
  • 00:09:23
    from that data. So, install graphino
  • 00:09:26
    today and if you enjoyed this video,
  • 00:09:28
    please like and share it to hack the
  • 00:09:29
    algorithm and check out my online store
  • 00:09:31
    base.win, where you can buy my awesome
  • 00:09:33
    merch or accessories for your phone or
  • 00:09:35
    laptop. 10% storewide discount when you
  • 00:09:37
    pay with Monero XMR at checkout. Have a
  • 00:09:39
    great rest of your day.
Tags
  • Android
  • Graphene OS
  • Privacy
  • Security
  • Google Pixel
  • Law Enforcement
  • Surveillance
  • Custom ROM
  • Data Protection
  • Smartphone