this post was submitted on 22 Mar 2026
969 points (99.5% liked)
Technology
82940 readers
2767 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Here is the popular phone cracking company Cellebrite's leaked slides showing them telling the people they're selling their tools to that they can't as easily (if at all, depending on device state) crack GrapheneOS as they can stock Android:
https://grapheneos.social/@GrapheneOS/112462758257739953 (This is just a well-summarized and explained post from GrapheneOS themselves, but the original leak was independent of them, and the slides and final interpretation are no different from what GrapheneOS is showing, thus I wouldn't consider this just "marketing")
Objectively, if you have a GrapheneOS phone, and you plug it into a Cellebrite machine, it will not have its data extracted if it's before first unlock, or after first unlock but on the lock screen. (as long as you've updated your security patches since like 2022, which most GrapheneOS phones will be) A stock Android phone, or even many iPhones were not as resistant to brute forces or even full file system extractions as a Pixel with GrapheneOS.
GrapheneOS also has additional features that can make the cracking process even more difficult, such as disabling USB even after first unlock when on the lock screen, automatically rebooting after set period to return the phone to BFU state, or setting a duress PIN that wipes the phone, which could be triggered via a brute force before the real PIN is guessed.
Also, in case you want to look at the diagrams in the post more since they don't really explain all the acronyms, here's a key:
You might be referring to Catalonia, Spain?
In their case, it was more about Pixel phones in general being used by criminals, and GrapheneOS being their OS of choice which made cracking them harder, rather than GrapheneOS itself being considered criminal or suspicious, but I get where you're coming from.
You could also be referring to the UK, but that was regarding a journalist with GrapheneOS, but the charge was refusing to unlock his phones. And yes, I said phones, because he was also carrying an iPhone, and they wanted that password too. So in this case the charge wasn't GrapheneOS-specific.
There's also France, who was going after GrapheneOS because they wanted an encryption backdoor, but GrapheneOS just said no, so they told police to consider any Pixel with GrapheneOS "suspicious", but not to consider it a crime in itself. (nor did they have the legal authority to do so) GrapheneOS actually migrated all their server infrastructure out of France as a result of this.
Generally speaking, even in those areas, this (fortunately) just isn't true. You are more likely to be considered suspicious in Catalonia if you have... a Pixel, GrapheneOS or not. You're likely to be criminally charged in the UK... if you don't give up your password, GrapheneOS or not. And you're likely to be considered "suspicious" in France... but can't be charged with anything for it, and the only way they'll know if you have GrapheneOS installed is if you were already arrested for something else and had your phone seized.
Practically speaking, it's better to support an OS that protects your data, but could increase the risk of you getting in trouble for protecting your data, than an OS that doesn't protect your data, and gives it all to the authorities, making whether or not you're considered criminal pointless. After all, you could voluntarily unlock your GrapheneOS phone in any of these jurisdictions and stop facing any of these possible consequences, and it would carry the same implication as a non-GrapheneOS phone that does it whether you provide your PIN/password or not.
So this:
Just isn't (at least currently) the case, since no regions currently doing anything against GrapheneOS have made the act of having GrapheneOS installed in itself a crime.
Not to say this couldn't change, and you're totally valid in assuming that governments will try to push this, but at least currently, using GrapheneOS will not in itself increase the chance of you going to a black site.