00:00:00
When it comes to smartphones, I
00:00:01
generally recommend Android. Not because
00:00:03
they provide better privacy and
00:00:04
security. I think that title actually
00:00:06
goes to iOS when compared to vanilla
00:00:08
Android. But the real reason I recommend
00:00:10
it, especially on a Google Pixel, is
00:00:13
because of the fact that the OS is less
00:00:14
locked down in that implementation. You
00:00:17
can gain root access to your device and
00:00:19
modify any of the system files. And you
00:00:21
can deleg your phone, which means
00:00:23
removing every single pre-installed
00:00:24
Google service from it, giving you much
00:00:26
better privacy. And you can even swap
00:00:28
out the entire operating system for
00:00:31
something different without having to
00:00:32
leave the bootloadader unlocked. But
00:00:34
imagine if just having a Google Pixel
00:00:37
phone resulted in you getting harassed
00:00:40
by your local police. Because the moment
00:00:42
they see you answer a call or send a
00:00:43
text on it, they assume that you must be
00:00:46
a criminal attempting to contact your
00:00:48
fellow criminal associates. Well, this
00:00:50
is actually the reality right now in
00:00:52
Catalina. The national police there have
00:00:55
been ramping up their war on drugs. And
00:00:57
in the age of smartphones, most of this
00:01:00
warfare is conducted in the digital
00:01:02
space by the police conducting mass
00:01:05
online surveillance of people and even
00:01:07
attempting to hack into suspects and
00:01:10
their associates devices with malware.
00:01:12
So, of course, the unlicensed
00:01:14
pharmaceutical distributors in Catalina
00:01:17
started stepping up their digital
00:01:18
security by using encrypted
00:01:20
communication apps and even going so far
00:01:23
as to install Graphine OS on their Pixel
00:01:27
phones. Now, in case you didn't know,
00:01:29
Graphine OS is a custom ROM that you can
00:01:31
install pretty much just exclusively on
00:01:34
Pixel phones, which improves the privacy
00:01:37
and security of that Android
00:01:39
implementation from the bottom up. And
00:01:42
frankly, it creates one of the most
00:01:44
secure smartphones that a civilian can
00:01:46
easily get in their hands. Way more
00:01:48
private and secure than even an iPhone.
00:01:51
Graphine OS also provides a lot of
00:01:54
tracking mitigations by limiting the
00:01:56
fingerprinting capability of apps. And
00:01:59
Graphine OS is completely deooled. So, a
00:02:02
lot of that tracking information from
00:02:04
things like Google Maps, Google Chrome,
00:02:07
the Google search engine that police
00:02:10
agencies around the world rely on to
00:02:11
track people just isn't available if
00:02:14
you're using Graphion OS. There's lots
00:02:17
of granular settings to control what
00:02:19
apps are able to access on your phone.
00:02:21
And Graphine OS provides dozens of user
00:02:24
profiles that you can use to further
00:02:26
separate what data your apps have access
00:02:29
to. and law enforcement are particularly
00:02:32
frustrated with Graphine OS's
00:02:34
mitigations against both consensual and
00:02:37
non-consentual data extractions. Now, I
00:02:39
don't really know much about this
00:02:41
country's laws or how their law
00:02:42
enforcement operates, but here in the
00:02:44
United States, if you're arrested or
00:02:47
even if you're detained for an
00:02:49
investigation by the police, there's a
00:02:51
good chance that they're going to want
00:02:53
to go through your phone if they think
00:02:55
that it contains any evidence of a
00:02:57
crime. And like I said, we're in a
00:02:58
digital age. So obviously, a lot of
00:03:00
criminals are using their phones in the
00:03:03
process of doing crime. Now, with a
00:03:06
consentbased search, as it's called, the
00:03:09
police are going to ask you to enter the
00:03:11
code on your phone and unlock it for
00:03:13
them. Uh, but of course, if you have
00:03:16
thumbrint unlock or Face ID enabled,
00:03:19
then there's a good chance that the
00:03:20
police can force you to unlock the phone
00:03:23
that way by just scanning your face or
00:03:25
maybe uh getting your fingerprint if
00:03:27
you're in handcuffs. But if you don't
00:03:29
have biometrics and you refuse to unlock
00:03:32
your phone, then the police are going to
00:03:35
seize it from you and probably arrest
00:03:37
you as well. and back at their
00:03:39
headquarters or in a mobile forensic
00:03:41
unit, they're going to connect your
00:03:43
phone to a device that's going to
00:03:44
attempt to hack into it and extract all
00:03:48
of the data from your phone and then
00:03:50
they'll be able to see everything that
00:03:52
you had on it. Now, the success of this
00:03:55
data extraction mostly relies in keeping
00:03:58
the phone in its after first unlock or
00:04:01
AFU mode. This is the setting that
00:04:04
phones are pretty much always in unless
00:04:06
you power them off or you reboot the
00:04:08
phone. And in this state, in the AFU
00:04:11
state, the decryption keys for your
00:04:13
phone's file system are saved in its
00:04:16
RAM. And so with CellBright's hacking
00:04:18
tools that they provide to law
00:04:20
enforcement, they're able to most of the
00:04:23
time recover that data um from most
00:04:26
phone models that are in the AFU mode.
00:04:29
But once a device is rebooted and then
00:04:31
before the PIN code is put into it, the
00:04:34
phone is in what's called before first
00:04:37
unlock or BFU mode. Biometric unlock
00:04:40
usually gets disabled in BFU mode and
00:04:42
the encryption keys are not saved into
00:04:45
the devices RAM. So the attack surface
00:04:47
is much smaller. And typically the only
00:04:50
way to reliably get data off a phone in
00:04:53
this mode is to guess the PIN. And the
00:04:56
secure element that's in more modern
00:04:58
smartphones makes that brute forcing
00:05:01
process much much harder. Graphine OS
00:05:05
has a feature that automatically reboots
00:05:07
your phone every 18 hours enabled by
00:05:10
default which puts it into the before
00:05:13
first unlock mode. Newer versions of
00:05:15
vanilla Android also have a similar
00:05:17
feature, but it's not enabled by
00:05:19
default. And I think when you do enable
00:05:22
it by default, it only reboots your
00:05:24
phone every 3 days or so. Uh so anyway,
00:05:27
if you're using Graphine OS and you
00:05:30
haven't gone out of your way to turn off
00:05:33
that security setting, then the police
00:05:35
are going to have 18 hours at best to
00:05:38
try and hack into your phone and try to
00:05:40
extract the encryption keys from RAM
00:05:43
before it reboots. And then this process
00:05:45
becomes pretty much impossible. Graphine
00:05:47
OS also disables USBC connections and
00:05:50
data transfers from new devices until
00:05:53
the phone is unlocked and the connection
00:05:56
is allowed. So those mitigations would
00:05:59
also have to be bypassed before the
00:06:01
Cellbrite can even start trying to hack
00:06:04
into Graphine. Now for the so-called
00:06:06
consensual data extractions where you
00:06:08
give up your phone password to the
00:06:10
police or unlock it for them possibly
00:06:12
under duress. Graphine OS has a
00:06:15
mitigation for that which is very
00:06:17
appropriately called duress pin.
00:06:20
Essentially this is a secondary pin that
00:06:22
you can enter on the unlock screen that
00:06:25
will wipe your device and any eims that
00:06:28
are installed into it. And if you do use
00:06:31
fingerprint unlock, then graph OS limits
00:06:34
the number of attempts to five. So you
00:06:37
have a much better chance of doing five
00:06:40
false unlocks like using the wrong
00:06:42
fingers or maybe if you've got your
00:06:44
hands behind your back and police are
00:06:46
trying to force you to unlock it, you
00:06:47
can, you know, either present the wrong
00:06:49
finger or maybe just mess it up enough
00:06:51
to get it to disable fingerprint unlock
00:06:54
and then require the PIN. Whereas in
00:06:56
vanilla Android, I think you get 20 or
00:06:59
so attempts. So yeah, obviously five is
00:07:02
going to be much more secure. The
00:07:03
multi-profile feature also allows you to
00:07:06
log into one profile without decryting
00:07:08
any data for another. So, you could have
00:07:10
a decoy profile that doesn't have any
00:07:13
sensitive data on it that you unlock
00:07:15
instead as a way to comply with a
00:07:18
warrant or, you know, comply with your
00:07:20
password being requested under duress
00:07:22
without actually giving up any
00:07:24
incriminating evidence. However, if the
00:07:27
phone does end up getting rebooted, then
00:07:29
the admin profile actually does need to
00:07:31
be logged into before any other profile
00:07:34
can be logged into. So, graphine OS
00:07:37
along with good opsac really gives you a
00:07:40
major privacy and security boost. So
00:07:42
much so to the point that law
00:07:44
enforcement agents are starting to
00:07:46
profile people just based on the type of
00:07:48
smartphone they choose to use. And
00:07:50
obviously from a distance, the cops
00:07:52
can't tell if you're using graphine OS
00:07:55
or Lineage OS or anything else. They
00:07:57
would actually have to get up close and
00:07:59
personal to verify that. And I'm sure
00:08:01
that nine times out of 10 people in
00:08:03
Catalina are just using stock Android on
00:08:07
their Google Pixels. But imagine how
00:08:09
triggered the police over there would be
00:08:11
if they actually did start discovering
00:08:14
Graphun OS every single time or at least
00:08:17
most of the time that they just talked
00:08:18
to any run-of-the-mill Pixel user.
00:08:21
Imagine you have two phones and you're
00:08:24
trying to do a side-by-side comparison
00:08:25
of a regular Pixel phone that's running
00:08:28
stock vanilla Android and then one
00:08:30
running graphine OS. The police over
00:08:32
there might actually think that you're
00:08:33
Pablo Escobar. So, I guess that that's a
00:08:36
great way to troll police who don't want
00:08:37
the citizens of their country to have
00:08:39
any decent privacy. Get a second Pixel
00:08:42
phone and just casually install Graphine
00:08:44
OS on it. Use it as like a portable MP3
00:08:46
player or whatever. Just just use it.
00:08:49
And you know what? If you really want to
00:08:50
mess with them, install Signal on it,
00:08:52
too, and just occasionally text yourself
00:08:54
on Signal and give yourself a username
00:08:57
on there. That sounds like some sort of
00:08:59
drug kingpen. That's probably the best
00:09:01
way to speedrun going to jail in
00:09:03
Catalina. But unironically, you should
00:09:06
install Graphine OS on your phone if you
00:09:08
want to have better privacy, and you
00:09:10
just don't want the police to be
00:09:11
actively scanning what you're doing and
00:09:14
monitoring and tracking you because
00:09:16
they're literally doing that to
00:09:17
everybody. It's not even people who are
00:09:18
suspects, just tracking where everybody
00:09:21
goes and then they filter out suspects
00:09:23
from that data. So, install graphino
00:09:26
today and if you enjoyed this video,
00:09:28
please like and share it to hack the
00:09:29
algorithm and check out my online store
00:09:31
base.win, where you can buy my awesome
00:09:33
merch or accessories for your phone or
00:09:35
laptop. 10% storewide discount when you
00:09:37
pay with Monero XMR at checkout. Have a
00:09:39
great rest of your day.