Luckily LineageOS and GrapheneOS have a lockdown mode (Graphene also supports disabling fingerprint for screen unlock), though rebooting your phone usually doesn’t cause you to lose any work since everything autosaves as phones kill background apps to save battery and memory. Separate user profiles for situations like protests or certain contexts (preferably with some dummy data to make it not look to sus) are also useful.
It’s very unlikely the OS actually kills apps in the background as that would legitimately break many apps and is a source of frustration from other OEMs.
There’s a difference between killing an app and putting it into a less active state.
When you swipe an app away from your recent lists, it’s not actually killing it, its just putting it in a different state.
When your force stop an app from its info under settings, you’re actually killing it. Nothing about it is alive.
When you actually kill an app, things like alarms stop functioning. The app needs to be alive for the alarm to function. Even so much that when you set an alarm on your phone, you need to set the alarm again after rebooting as they arent permanently stored and if the phone is rebooted the app needs to be woken up and the alarms re set. There’s a whole development workflow to do that.
There was a brief period many years ago when an OEM actually force killed an app when swiped away from recents without fully understanding the implications and they later reverted the change.
Push notifications of any type would also completely cease functioning.
Turn on pin-secured boot and shut off the phone and a fingerprint should be useless now, right? And don’t the cops have a lot people’s fingerprints on record? Are we just waiting for a cop with a higher than room temperature IQ to come up with a duplicating method to get in people’s phones without warrant or even probable cause?
The initial pin that most folks have to enter is needed to decrypt the partition with user data. This is not 100% foolproof for keeping LEOs out since there are many known, and likely more unknown, ways to brute force these but it is still the best option.
Some do. You can also just restart a phone real quick and it’ll demand your passcode not biometrics.
The passcode itself isn’t circumvented by this, after all.
But locking/resetting your phone should be an urgent thing, if you suspect the police will take it. Apple also does this if you hit the power button 5 times fast.
Samsung phones have a lockdown mode you can get to when you keep the power button pressed (like when you want to shut down). The legal situation is the same here in Germany - fingerprint unlock can be forced, regular pin or other measures not.
Payne conceded that “the use of biometrics to open an electronic device is akin to providing a physical key to a safe” but argued it is still a testimonial act because it “simultaneously confirm[s] ownership and authentication of its contents,” the court said. “However, Payne was never compelled to acknowledge the existence of any incriminating information. He merely had to provide access to a source of potential information.”
If you can be compelled to hand over a key to a safe, I can see how that translates to putting your thumb on the scanner.
The constitution is only used to protect property rights of the owners and the power of managers. The working class is not often afforded it’s protections.
Never use biometrics to lock anything. You can be forced to push a finger to a sensor, or your head forcibly held still for a facial scan.
Only use passwords/passcords. only they are secure against this totalitarian bullshit.
They’ll still put you in jail on fake charges if you refuse to give your passcode, but at least your datas safe and now your case is unlawful imprisonment instead of relying on octogenarian judges thinking its okay to force compliance with a biometric.
If we’re talking about a situation where they can just straight up beat you legally until you give them a passcode, then what’s on your phone likely doesn’t make a difference in the outcome.
You don’t want to wipe it, you just want to lock it. Wiping it in that moment would get you in trouble.
You do not have to help them access incriminating information about you, but you cannot destroy potentially incriminating information after they’ve started doing their search…
At the point that they have ordered you to unlock the phone, an investigation has begun, so if you do anything to the data on that phone, it could be considered destroying evidence.
Kind of in the same way that if the cops are searching your home and you try to flush some cocaine, they would consider that destroying evidence. But if you flushed cocaine the moment you saw cops on your street, that wouldn’t count as destroying evidence, because there was no investigation at the time.
Is there a way to set up multiple user profiles for the same phone, activated by different prints/PINs?
Then you could have your main profile unlocked by like your ring finger print; but if you scan your thumb or index, it’ll unlock basically a dummy account with some bullshit apps and contacts and nothing else.
Like the phone equivalent of a throw wallet with a few bucks and an expired credit card or two so you have something to surrender in the event of getting mugged, without losing anything of actual value.
I don’t know of how to do that without visibly switching accounts, but I believe the GrapheneOS folks are prepping a “duress PIN” for the next major release. I’m not 100% sure of what it entails but could have a similar end result to what you’re after
The problem there would be if they have told you to unlock the device and you do something to further lock it down, and they can prove that you did that (like there’s some big letters on the lock screen that say “lockdown initiated” or something), that can be considered obstruction.
To picture it another way, imagine you had the one key to your vault, they order you to unlock it, and you swallow the key.
It’s kind of in the same way that you can destroy evidence at any time until an investigation has started or you have a reasonable belief that one is about to start. At that point, destroying the evidence would get you in trouble.
Depends a bit on your threat model I suppose. Journalist protecting a source? Probably helpful. Getting mugged? Helpful for preventing ID theft, but potentially increased risk of physical harm. Political dissident covering up regionally unprotected speech? Obstruction charge may be less harmful than the alternative. Wall Street trader shredding insider trading documents? Obstruction charge may be worse.
This is a gross oversimplification but shows how it could be helpful even if it isn’t ideal in every situation.