Skip to content

In North Korea, your phone secretly takes screenshots every 5 minutes for government surveillance

Technology
278 178 1.3k
  • Yeah, but at least it's our corporate overlords and not the government!!

    /s

    Snowden may disagree with that.

  • Unless the government wants to buy the data in which case it's just good capitalism

    They won't even buy it, they'll just find a zero day and steal the data while everyone is none the wiser.

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    Probly happens in the US too but we won't know until a whistleblower comes forward and gets a lifetime of solitary confinement for telling us

  • They won't even buy it, they'll just find a zero day and steal the data while everyone is none the wiser.

    No, I believe they come to the company and say "Give us a live feed or we shut you down. Also if you tell anyone we shoot your wife" https://en.wikipedia.org/wiki/PRISM

  • NK censors reviewing photos...

    "Toilet, toilet, toilet, cat, toilet..."

    I'm sure it's automated. And a screenshot would be what you see on the screen, not what the cameras see

  • No, I believe they come to the company and say "Give us a live feed or we shut you down. Also if you tell anyone we shoot your wife" https://en.wikipedia.org/wiki/PRISM

    Lil o' column A, lil o' column B https://en.m.wikipedia.org/wiki/EternalBlue

  • Do those code snippets on the Stackoverflow post allow you to capture the entire screen regardless of which app is open, or do they only allow you to capture the app the code is running in?

    Capturing the app itself makes sense (for things like bug reports) but does Android really let any app capture whatever is on the screen?

    no, they only allow the app to capture its own screen content. to make a regular screenshot of the whole display, the app needs a permission that the user has to approve every single time, at least on most phones. that API is actually for continuous screen recording, but of course usable for this purpose too. this also means that after getting approved by the user, the app can keep its recording sessions to keep more screenshots, but that ends when the app gets killed by android. I think the system also shows a notification when an app is recording, but as anything that too could vary with phones.

  • Probly happens in the US too but we won't know until a whistleblower comes forward and gets a lifetime of solitary confinement for telling us

    didn't google just announce android was gonna do the same thing?

    edit: it was microshaft.

  • So glad that censorship bull shift can't happen in a ducking free democracy! /s

    I don't know that ducks have democracy

  • Anyone who still thinks that after the last year and a half of it operating as a pro-genocide propaganda outlet for Israel either hasn't been paying attention, or are themselves pro-genocide.

    Lmao got banned from his own server

  • Probly happens in the US too but we won't know until a whistleblower comes forward and gets a lifetime of solitary confinement for telling us

    Yep. Just like with reverse-engineering software and making unintented use of proprietary services, whistleblowing depends at nobody being able to threaten you with jail or worse.

    Your country should have made it law when Watergate and such were still fresh in memory. To make such mechanisms not just "de facto", but "de jure" reality. Because any "de facto" either becomes "de jure" or vanishes without a trace.

    EDIT: similar with "adversarial interop" CD was talking about

    EDIT2: or Gutenberg and the printing press and the conflicts to ensue...

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    In the westwe call it Microsoft Recall

  • Lmao got banned from his own server

    Are you still stalking me around?

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    Say what you want about them but they're the only one who truely know how to deal with the right wingers. Look at Germany, they abolished the Stasi and not even 30 years later the nazi are as popular as ever

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    hope the government likes my johnlock obsession

  • Oh yeah, have there been reports on this ?

    (Not trying to shut you down, I'm genuinely curious)

    There's an extremely powerful backdoor in every processor/chipset. Intel named it "Management Engine" and AMD "Secure Technology".

    From the Wikipedia page on Management Engine:

    The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system.

    ME has Serial over LAN, so it's possible that attackers can have a more intimate access to your hardware than your Operating System.

    I imagine other manufacturers have similar frameworks.

    Full article.

  • There's an extremely powerful backdoor in every processor/chipset. Intel named it "Management Engine" and AMD "Secure Technology".

    From the Wikipedia page on Management Engine:

    The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system.

    ME has Serial over LAN, so it's possible that attackers can have a more intimate access to your hardware than your Operating System.

    I imagine other manufacturers have similar frameworks.

    Full article.

    Sure, those could theoretically be used for backdoor access to your computer.

    However, they are trivial to spot on most routers. If you see another device on the ethernet port that your computer connects to, then something weird is going on.

    Another important consideration is the fact that those technologies are meant for ethernet, while most people use laptops with wifi.

  • In the westwe call it Microsoft Recall

    No that's totally different... it will be used the same way but it takes much less manual work to perform

  • Nicole Perlroth

    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

    is a must read for people. All agencies, from USAF through FBI to NSA, were buying zero days separately. En mass. As much as they could. Just in case.

    Google bug hunting program stems from USA getting into their networks and stealing data.

  • Say what you want about them but they're the only one who truely know how to deal with the right wingers. Look at Germany, they abolished the Stasi and not even 30 years later the nazi are as popular as ever

    There isn’t a communist party in NK is just a dictatorship. Do not confuse the two even if it tries to veil itself in thin rhetoric.

  • Understanding The Data Center Water Regulation Debate

    Technology technology
    1
    1
    14 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 251 Stimmen
    90 Beiträge
    9 Aufrufe
    horse@feddit.orgH
    Kobe Bryant dedicated all his waking hours to basketball, and I don’t think there’s a lot of people saying that Kobe Bryant shouldn’t have worked as hard as he did. Yeah, but he was working to achieve something for himself and not to make some parasite richer.
  • 169 Stimmen
    5 Beiträge
    34 Aufrufe
    K
    But but we need to power our virtual idiot with more energy than entire countries use :((
  • 677 Stimmen
    179 Beiträge
    846 Aufrufe
    D
    Thats what the firewall rules do too, don't allow internet connection if there's no vpn connection. Firewall is a system-wide solution that always works, while qbt config relies heavily on the application implementing interface binding properly. Which it doesn't fully btw.
  • 425 Stimmen
    80 Beiträge
    500 Aufrufe
    S
    It really depends on the company. Some look for any way to squeeze you. Others are pretty decent and probably more efficient as they dont waste as many working hours on bullshit claims and claim resolution. Also if i rent a car i want things to go smoothly. I got places to be. You make my life easy, ill happily pay again and do my best to make yours easy too.
  • No JS, No CSS, No HTML: online "clubs" celebrate plainer websites

    Technology technology
    205
    2
    772 Stimmen
    205 Beiträge
    982 Aufrufe
    R
    Gemini is just a web replacement protocol. With basic things we remember from olden days Web, but with everything non-essential removed, for a client to be doable in a couple of days. I have my own Gemini viewer, LOL. This for me seems a completely different application from torrents. I was dreaming for a thing similar to torrent trackers for aggregating storage and computation and indexing and search, with search and aggregation and other services' responses being structured and standardized, and cryptographic identities, and some kind of market services to sell and buy storage and computation in unified and pooled, but transparent way (scripted by buyer\seller), similar to MMORPG markets, with the representation (what is a siloed service in modern web) being on the client native application, and those services allowing to build any kind of client-server huge system on them, that being global. But that's more of a global Facebook\Usenet\whatever, a killer of platforms. Their infrastructure is internal, while their representation is public on the Internet. I want to make infrastructure public on the Internet, and representation client-side, sharing it for many kinds of applications. Adding another layer to the OSI model, so to say, between transport and application layer. For this application: I think you could have some kind of Kademlia-based p2p with groups voluntarily joined (involving very huge groups) where nodes store replicas of partitions of group common data based on their pseudo-random identifiers and/or some kind of ring built from those identifiers, to balance storage and resilience. If a group has a creator, then you can have replication factor propagated signed by them, and membership too signed by them. But if having a creator (even with cryptographically delegated decisions) and propagating changes by them is not ok, then maybe just using whole data hash, or it's bittorrent-like info tree hash, as namespace with peers freely joining it can do. Then it may be better to partition not by parts of the whole piece, but by info tree? I guess making it exactly bittorrent-like is not a good idea, rather some kind of block tree, like for a filesystem, and a separate piece of information to lookup which file is in which blocks. If we are doing directory structure. Then, with freely joining it, there's no need in any owners or replication factors, I guess just pseudorandom distribution of hashes will do, and each node storing first partitions closest to its hash. Now thinking about it, such a system would be not that different from bittorrent and can even be interoperable with it. There's the issue of updates, yes, hence I've started with groups having hierarchy of creators, who can make or accept those updates. Having that and the ability to gradually store one group's data to another group, it should be possible to do forks of a certain state. But that line of thought makes reusing bittorrent only possible for part of the system. The whole database is guaranteed to be more than a normal HDD (1 TB? I dunno). Absolutely guaranteed, no doubt at all. 1 TB (for example) would be someone's collection of favorite stuff, and not too rich one.
  • 285 Stimmen
    134 Beiträge
    628 Aufrufe
    I
    I'm not afraid of that at all. But if you draw shit tons of power from a crappy socket, things start to heat up real quick. Like getting really fucking hot, as in burn your house down hot.
  • An earnest question about the AI/LLM hate

    Technology technology
    57
    73 Stimmen
    57 Beiträge
    252 Aufrufe
    ineedmana@lemmy.worldI
    It might be interesting to cross-post this question to !fuck_ai@lemmy.world but brace for impact