TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How to secure phone against state actor?

13 pointsby daveorzachabout 2 years ago
A friend is traveling abroad with sensitive information that a foreign government may want or may target after they learn it was shared. Are there any guides for securing a Android or iPhone against state actors?

12 comments

grepcatabout 2 years ago
The most simple answer is don&#x27;t. Divorce it from the device, fully encrypt it and transfer it separately from your friend.<p>Then, when traveling, have your friend carry a separate completely clean phone. If he&#x27;s suspected and the phone is compromised, it won&#x27;t be found.<p>When you say state actor, it implies that they&#x27;re efforts are funded with and armed with the vast resources of a nation which means they could manipulate regular citizens, police forces, or potentially bring a considerable military force to bear against this problem, so the most effective approach would be to separate the person from the information entirely.
评论 #35041797 未加载
brudgersabout 2 years ago
To put it in perspective, state actors have departments full of people who spend their work weeks figuring out how to act on behalf of the state and then executing upon those methods.<p>Those people are more organized than you. They are more motivated. They often have the resources to align Apple&#x27;s and Google&#x27;s interests with their own.<p>And they are more motivated than you. They are patriotic and surrounded by people who are patriotic and paid to be patriotic.<p>A state actor can travel to your state and get the information when just beating it out of you isn&#x27;t the better option...but if you&#x27;re in its state, beating the information out of you is probably the simplest thing that might work.<p>The revolution will not happen on your smartphone. Those days are past and the Arab Spring taught states all they needed to know.<p>Good luck.
评论 #35039316 未加载
aborsyabout 2 years ago
Governments (such as Saudi Arabia) often buy expensive hacking software from the companies abroad (such as NSO in Israel), needless to say with citizens tax money. Such software can hack into any phone, even with zero click. A mere phone number would be enough. They also have internal hacking teams and APTs, with own hacking tools.<p>Further, if you are in a country that manufactures key closed source components of the phone, you should assume that the government of that country can access the phone with the help of a backdoor or zero days embedded in the closed source software or hardware. iPhone is a good example.<p>Sandboxing in desktop is worse. Still you can better lock down a laptop if you know what you’re doing, since a computer is not linked to a phone number and you can leverage the flexibility.
评论 #35039326 未加载
toast0about 2 years ago
Leave the phone in their home country? Bring a burner phone for communications while traveling, and don&#x27;t connect it to accounts.
cookiengineerabout 2 years ago
Opsec mandates to buy throwaway devices for such purposes.<p>The easiest way to travel state borders is to buy something like an old Dell Latitude (core2duo generation) with libreboot and a LUKS encrypted Linux on it.<p>Don&#x27;t take your phone with you, especially if it&#x27;s necessary for 2FA or can be (ab-)used for recovery of accounts.<p>Use a phone that&#x27;s easily reflashable in case it gets compromised. Fairphone 3&#x2F;3+ or Pinephone come to mind, depending on whether or not you want to deal with mobile Linux. Otherwise Xiamo Redmi Note 8&#x2F;8T or devices with a MediaTek CPU. MediaTek ARM CPU has developer tools which have been leaked, and is a rootkit that can uninstall&#x2F;reflash other rootkits :P<p>Note that there are already some rootkits in the ARM space so you also need to make sure the ARM blob hasn&#x27;t changed, which is why I would not recommend a device that hasn&#x27;t been integrated with the upstream kernel or hasn&#x27;t got their blobs available.<p>Never use broadcom based wireless Hardware, because of broadpwn and bluepwn. Change the laptop&#x27;s wifi card to an Atheros one.
hayst4ckabout 2 years ago
I would give this a watch:<p><a href="https:&#x2F;&#x2F;www.pbs.org&#x2F;wgbh&#x2F;frontline&#x2F;documentary&#x2F;global-spyware-scandal-exposing-pegasus&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.pbs.org&#x2F;wgbh&#x2F;frontline&#x2F;documentary&#x2F;global-spywar...</a><p>Journalists, your parents, your friends... every contact can be weaponized.<p>You can attempt to trust apple&#x27;s new features, but I don&#x27;t think the world knows how effective they are yet. Going through a border with enhanced security features to defend yourself from state actors at great cost of convenience is going to make a person stand out.
tbihlabout 2 years ago
As others have alluded, the attack surface on a smartphone is too large to ever be secure against sophisticated and wealthy adversaries. The regimes most inclined to spy are the same ones who spend the most on point-and-shoot exploits to own your phone.<p>Best answer from a US perspective is Michael Bazzell&#x27;s work, with product specific to mobile phones having just been released: <a href="https:&#x2F;&#x2F;inteltechniques.com&#x2F;book7a.html" rel="nofollow">https:&#x2F;&#x2F;inteltechniques.com&#x2F;book7a.html</a>
giantg2about 2 years ago
&quot;How to secure phone against state actor?&quot;<p>Don&#x27;t use one.
speedgooseabout 2 years ago
I believe a good blender can prevent a state actor to access sensitive information stored on a smartphone. But I would spread the resulting dust over a large random and secret area just to be on the safe side.
joshxyzabout 2 years ago
ya&#x27;ll really storing sensitive info in your phone, oh dear.
gaddersabout 2 years ago
Obligatory XKCD: <a href="https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;</a><p>How ruthless is the foreign government? Make sure the person carrying the phone doesn&#x27;t have the encryption keys.
moremetadataabout 2 years ago
&gt; Are there any guides for securing a Android or iPhone against state actors?<p>You cant, in fact an entire industry exists namely infosec to mislead you into this line of thinking, in much the same way the diet and weightloss industry exists to make you think its possible to stay slim and sexy for the rest of your life!