Coming from a district court, I think this ruling could be appealed, but it’s welcome news nevertheless.

  • bdonvr@thelemmy.club
    link
    fedilink
    arrow-up
    33
    ·
    4 months ago

    This is important - power OFF your phone. Your phone is more secure before you unlock it for the first time after booting. Use a strong password as well.

    • halcyoncmdr@lemmy.world
      link
      fedilink
      English
      arrow-up
      17
      arrow-down
      1
      ·
      edit-2
      4 months ago

      You can also force your device into Lockdown mode, which does the same thing, without needing to shut it down or restart it. It’s easy to do quickly once you know how.

      On Android it’s enabled by default, you just hold the power button and press Lockdown.

      https://www.lifewire.com/use-android-lockdown-mode-6287933

      Iphones have a way to disable biometrics as well with a button combo, but its more a side effect of activating Emergency SOS, not a dedicated feature and how you activate it varies depending on your device model.

      https://thenextweb.com/news/how-to-quickly-disable-biometrics-iphone

      • bdonvr@thelemmy.club
        link
        fedilink
        arrow-up
        12
        ·
        edit-2
        3 months ago

        Lockdown mode is NOT the same. This disables biometrics, notifications, etc. But what FULLY rebooting does is protect against more sophisticated attacks like those of Cellebrite which is a company that sells devices to law enforcement that break into phones. I know border crossings often have access to a device of this type.

        Your device is encrypted pretty strongly, and before you put in your password for the first time after boot your data is essentially useless. But after that first time your device keeps the decryption key in memory so that it can be useful even while locked, serving you app notifications and processing in the background. This leaves your device open to many more exploits that could get around your lockscreen and into your unencrypted data. Leaked documents show that Cellebrite can very often get into devices after first unlock, but in the “before first unlock” state they can often only use brute force which you can protect against by having a cryptographically secure password.

        Looking at lockdown mode it’s pretty clear that it isn’t resetting to the more secure “before first unlock” state because it unlocks instantly with your password whereas after first boot there’s a small pause.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        ·
        4 months ago

        I don’t think the lockdown mode is the same. It looks like it just disables biometric unlocking. I just tried, and it was far too quick to unlock, so it must keep the encrypted partition unlocked.