<oembed><type>rich</type><version>1.0</version><title>final [GrapheneOS] 📱👁️‍🗨️ wrote</title><author_name>final [GrapheneOS] 📱👁️‍🗨️ (npub1c9…7sqfm)</author_name><author_url>https://yabu.me/npub1c9d95evcdeatgy6dacats5j5mfw96jcyu79579kg9qm3jtf42xzs07sqfm</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>These details should tell you that if you consider these types of groups (sophisticated adversaries with limitless physical access) as a part of your threat model, then you should:&#xA;&#xA;- Use the most recent phone you possibly can&#xA;&#xA;- Upgrade your phone to the newest possible generation as soon as possible after release if you can help it.&#xA;&#xA;- Use the latest version of GrapheneOS ASAP. Do not delay.&#xA;&#xA;- Use a strong, high entropy passphrase to make bruteforcing the device credential impossible if secure element is ever exploited.&#xA;&#xA;- Set GrapheneOS auto reboot time accordingly so encrypted data goes back at rest when the phone reboots, which makes AFU exploitation impossible. The lower the better.&#xA;&#xA;- Enable duress password. Set it to something easy to trigger but not easy to misfire.&#xA;&#xA;- Turn your phone off in a high risk situation, and trigger duress when in a duress situation.&#xA;&#xA;- Disable your radios when not using them (turn off Wi-Fi, use airplane mode, disable NFC, UWB etc.) for attack surface reduction.&#xA;&#xA;- Set an appropriate USB port control or disable the USB port so they aren&#39;t able to connect a device to it.&#xA;&#xA;- Use user profiles (application data and user files within profiles are stored encrypted with separate credentials).&#xA;&#xA;- Enable upcoming GrapheneOS security features like second factor authentication unlock when they come out.&#xA;&#xA;- Communicate only over secure messaging. Some apps like Molly (Signal fork) have features to encrypt the app storage with a passphrase, which access to that app&#39;s data impossible even when a profile is compromised  providing the passphrase is secure enough.&#xA;&#xA;- Become disassociated to data. Learn to only keep files or other data as long as it is necessary. If you have no use for them for a long time, then back it up elsewhere, encrypted. Delete anything you don&#39;t have a use for in the present. Your data is not your memories. &#xA;&#xA;- Remember that you are only as secure as the people you trust. If they do not meet your safety or security requirements, don&#39;t enable them to do things that could cause trouble.&#xA;&#xA;nostr:nevent1qqs8uxurjncnpj8uyzqy5gd3lyevzd8u92xhk2xe9fdln5y03hgwrwgpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsgwaf3p</html></oembed>