If you’re comparing stock OS vs Lineage, the password length doesn’t really matter. The issue would be vulnerabilities introduced by having an unlocked bootloader, or security updates that haven’t been applied to Lineage OS.
Also its hard to answer what ‘police’ can do because that varies widely depending on which LE you’re dealing with. Basically any data can be retrieved given enough time and resources. So the this all depends on what your threat landscape looks like.
I am no expert on lineage, so take this all with a grain of salt. You being fully updated on lineage doesn’t necessarily mean you have all security updates. The OS maintainers will take time to implement fixes after vulnerabilities are reported, and there may be a delay even if google has patched core android. Manufacturers have that same issue however, so this isn’t unique to Lineage.
The bootloader being unlocked will always be a weak point, and last I looked into it most phones don’t allow for the bootloader to be locked after unlocking.
Having your software and firmware up to date is always going to be a good idea. And if you’re expecting to go somewhere that you might be detained (protests/demonstrations) then it might be a good idea to just not bring the phone at all. Physical access to a device offers significantly more options for pulling data from the device.
Not bringing a phone to a protest is a govts wet dream. Bring a burner phone. The real issue, assuming signal jamming, is how to propagate video chunks thru a mesh network until node(s) find working Internet connection(s) and the video chunks can be distributed out to multiple servers.
Also would be nice to be connected to coordinators to break up mob into cells with distributed specific targets.
Why do we have to suck at what we do?
Seeing police with riot gear in a phalanx, and crowds pushed against them. Looks like failure to me; lost opportunity. Where in da f are the coordinators?
that is the safest scenario, as safe as non-lineage android can be. they can’t mount your encrypted filesystem and get shit off it as it’s BFU.
the unlocked bootloader people are referencing plays no role in this setup, as all they can do with it is potentially install shit that will get at your stuff after you unlock it. naturally, that phone get tossed and never used again.
I can remember back from my more experimental days, the moment your bootloader is unlocked, your phone is wide open to a lot of mischief and attacks. Meaning if you have to leave your bootloader unlocked to use a custom ROM, it’s probably not ideal.
On the other hand, your manufacturers OS might have some intentional backdoors, or just insecurities in some of the OEM apps, that make it easier to exploit, but that’s obviously hard to say/check.
If you’re comparing stock OS vs Lineage, the password length doesn’t really matter. The issue would be vulnerabilities introduced by having an unlocked bootloader, or security updates that haven’t been applied to Lineage OS.
Also its hard to answer what ‘police’ can do because that varies widely depending on which LE you’re dealing with. Basically any data can be retrieved given enough time and resources. So the this all depends on what your threat landscape looks like.
So here are the senarios I’ve come up with:
I am no expert on lineage, so take this all with a grain of salt. You being fully updated on lineage doesn’t necessarily mean you have all security updates. The OS maintainers will take time to implement fixes after vulnerabilities are reported, and there may be a delay even if google has patched core android. Manufacturers have that same issue however, so this isn’t unique to Lineage.
The bootloader being unlocked will always be a weak point, and last I looked into it most phones don’t allow for the bootloader to be locked after unlocking.
Having your software and firmware up to date is always going to be a good idea. And if you’re expecting to go somewhere that you might be detained (protests/demonstrations) then it might be a good idea to just not bring the phone at all. Physical access to a device offers significantly more options for pulling data from the device.
Not bringing a phone to a protest is a govts wet dream. Bring a burner phone. The real issue, assuming signal jamming, is how to propagate video chunks thru a mesh network until node(s) find working Internet connection(s) and the video chunks can be distributed out to multiple servers.
Also would be nice to be connected to coordinators to break up mob into cells with distributed specific targets.
Why do we have to suck at what we do?
Seeing police with riot gear in a phalanx, and crowds pushed against them. Looks like failure to me; lost opportunity. Where in da f are the coordinators?
that is the safest scenario, as safe as non-lineage android can be. they can’t mount your encrypted filesystem and get shit off it as it’s BFU.
the unlocked bootloader people are referencing plays no role in this setup, as all they can do with it is potentially install shit that will get at your stuff after you unlock it. naturally, that phone get tossed and never used again.
two points:
I can remember back from my more experimental days, the moment your bootloader is unlocked, your phone is wide open to a lot of mischief and attacks. Meaning if you have to leave your bootloader unlocked to use a custom ROM, it’s probably not ideal.
On the other hand, your manufacturers OS might have some intentional backdoors, or just insecurities in some of the OEM apps, that make it easier to exploit, but that’s obviously hard to say/check.
From my quick search, it looks like it might be possible to re-lock your bootloader with certain manufacturers of you have the right signing keys, but that’s definitely some advanced level fingerling at that point: https://www.reddit.com/r/LineageOS/comments/n7yo7u/a_discussion_about_bootloader_lockingunlocking/