this post was submitted on 30 Jan 2026
291 points (99.3% liked)

Privacy

45174 readers
535 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

The recent federal raid on the home of Washington Post reporter Hannah Natanson isn’t merely an attack by the Trump administration on the free press. It’s also a warning to anyone with a smartphone.

Included in the search and seizure warrant for the raid on Natanson’s home is a section titled “Biometric Unlock,” which explicitly authorized law enforcement personnel to obtain Natanson’s phone and both hold the device in front of her face and to forcibly use her fingers to unlock it. In other words, a judge gave the FBI permission to attempt to bypass biometrics: the convenient shortcuts that let you unlock your phone by scanning your fingerprint or face.-

It is not clear if Natanson used biometric authentication on her devices, or if the law enforcement personnel attempted to use her face or fingers to unlock her devices. Natanson and the Washington Post did not respond to multiple requests for comment. The FBI declined to comment.

you are viewing a single comment's thread
view the rest of the comments
[–] termaxima@slrpnk.net 31 points 16 hours ago (3 children)

Use GrapheneOS so you can "unlock" your phone and enter the wipe code instead.

[–] Carrot@lemmy.today 2 points 5 hours ago

You don't have to give them your password, and GrapheneOS has a convenient feature to turn off biometric unlock for only unlocking the phone, but still lets you use it in apps

[–] pemptago@lemmy.ml 1 points 6 hours ago

Wasn't there a legal dispute around this that was trying to get them with tampering/destruction of evidence? Not sure if it's foolproof.

If you do use GrapheneOS, quickly restarting the device means your pin is required before biometrics unlock is available. As I understand it -- in the U.S. -- law enforcement can legally compel you to unlock your phone with biometrics, but not a pin. Not that you can trust law enforcement to be law abiding, but at least it's a stronger case in court.

[–] this@sh.itjust.works 30 points 16 hours ago (3 children)

Even better, set it to 1234567890 or 00000000 or similar easy to guess pin, and change it to the length of your actual pin, now if someone tries to bruteforce your phone it will instantly wipe and you can make a case that it was the law enforcement who destroyed any "evidence" by their own actions if in comes up In court.

[–] davetortoise@reddthat.com 25 points 16 hours ago (4 children)

This sounds like a convenient way to have all your locally saved photos wiped by your kid

[–] discocactus@lemmy.world 4 points 9 hours ago

In this economy??!

[–] FirstCircle@lemmy.ml 4 points 9 hours ago

You mean you're not having your photos automatically, immediately encrypted and backed up on remote servers? ente.io will do that for you and their free plan comes with 10G of storage which is quite a few pics.

[–] this@sh.itjust.works 17 points 14 hours ago (1 children)

Always back up anything you don't want to loose.

[–] partofthevoice@lemmy.zip 1 points 14 hours ago (1 children)

How should I protect the backups? Same story?

[–] this@sh.itjust.works 9 points 14 hours ago

Your backups aren't nearly as likely to be subject to an immediate civil forfiture as a phone is. Cops don't need a judicial warrent to take your phone, but they do need one to search your home legally, and if you do your offsite backups in another country, they would need the cooperation of the local authorities of that country. Strong encryption can provide a relatively safe barrier for offsite backups.

Also, it's possible to have some things that may only exist on your phone and not your server/backup system(easy biometric unlock for a password manager, or encrypted chat logs, to name a few examples).

[–] daisykutter@lemmy.dbzer0.com 10 points 15 hours ago (1 children)

These practices and tips are not for everyday people but for high targets and work devices

[–] partofthevoice@lemmy.zip 9 points 14 hours ago* (last edited 14 hours ago)

Actually, these tips are for every day people (just not people whose kids can get to their phones). High targets get their ram frozen with liquid nitrogen, their PSU spliced into a battery pack, and the entire system-state backed up for retries.

[–] spizzat2@lemmy.zip 8 points 15 hours ago (1 children)

Don't they make a copy of the phone before they go about trying to unlock it?

This kind of security is only going to work against a careless or incompetent atta-- oh. I see...

[–] Zorsith@lemmy.blahaj.zone 7 points 15 hours ago* (last edited 15 hours ago) (2 children)

That requires USB connection to even be possible with a locked phone.

[–] this@sh.itjust.works 8 points 14 hours ago (1 children)

Yes, and you can disable usb completely on graphene.

[–] FauxLiving@lemmy.world 11 points 14 hours ago

It also will not accept new USB connections while the screen is locked.

[–] partofthevoice@lemmy.zip 1 points 14 hours ago

Not for state sponsored campaigns. They’ll cut the damn chips from your phone and send signals directly to the individual pins if they have to. They’ll freeze your ram into super cold state to make it nonvolatile. They’ll do some crazy shit, man.