Skip to content

In North Korea, your phone secretly takes screenshots every 5 minutes for government surveillance

Technology
278 178 12
  • Lmao got banned from his own server

    Are you still stalking me around?

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    Say what you want about them but they're the only one who truely know how to deal with the right wingers. Look at Germany, they abolished the Stasi and not even 30 years later the nazi are as popular as ever

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    hope the government likes my johnlock obsession

  • Oh yeah, have there been reports on this ?

    (Not trying to shut you down, I'm genuinely curious)

    There's an extremely powerful backdoor in every processor/chipset. Intel named it "Management Engine" and AMD "Secure Technology".

    From the Wikipedia page on Management Engine:

    The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system.

    ME has Serial over LAN, so it's possible that attackers can have a more intimate access to your hardware than your Operating System.

    I imagine other manufacturers have similar frameworks.

    Full article.

  • There's an extremely powerful backdoor in every processor/chipset. Intel named it "Management Engine" and AMD "Secure Technology".

    From the Wikipedia page on Management Engine:

    The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host's operating system.

    ME has Serial over LAN, so it's possible that attackers can have a more intimate access to your hardware than your Operating System.

    I imagine other manufacturers have similar frameworks.

    Full article.

    Sure, those could theoretically be used for backdoor access to your computer.

    However, they are trivial to spot on most routers. If you see another device on the ethernet port that your computer connects to, then something weird is going on.

    Another important consideration is the fact that those technologies are meant for ethernet, while most people use laptops with wifi.

  • In the westwe call it Microsoft Recall

    No that's totally different... it will be used the same way but it takes much less manual work to perform

  • Nicole Perlroth

    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

    is a must read for people. All agencies, from USAF through FBI to NSA, were buying zero days separately. En mass. As much as they could. Just in case.

    Google bug hunting program stems from USA getting into their networks and stealing data.

  • Say what you want about them but they're the only one who truely know how to deal with the right wingers. Look at Germany, they abolished the Stasi and not even 30 years later the nazi are as popular as ever

    There isn’t a communist party in NK is just a dictatorship. Do not confuse the two even if it tries to veil itself in thin rhetoric.

  • There isn’t a communist party in NK is just a dictatorship. Do not confuse the two even if it tries to veil itself in thin rhetoric.

    Do you know a communist country that hasn't devolved into a dictatorship?

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    At that point give up the phone and live traditionally!

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    The true source of Microsoft innovations in Windows.

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    does anyone really think our freedom phones are far from this?

    Maybe the western world can be given some credit on being a tad more subtle, but overall the difference here are in tecnique, not goals

  • Archived Link

    A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality.
    The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

    It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

    One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

    Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

    Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

    The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

    Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

    The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

    Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

    So just like the phones we have in North America.

  • does anyone really think our freedom phones are far from this?

    Maybe the western world can be given some credit on being a tad more subtle, but overall the difference here are in tecnique, not goals

    Its funny, a screenshot every 5 minutes that might be reviewed later on if needed sounds less intrusive than western efforts like google, amazon, etc.

  • I had a friend paraphrase the plot of fahrenheit 451 for me, because I haven't read it. Talk about ironic!

    On another note, I need to read more

    I did this the other day but didnt realize the irony at the time...

  • It really is a shame, as accurate reporting enables their crimes to be documented better, and gives them less ammo on the world stage.

    "How can we be mistreating our citizens? Remember when people said sarcasm was banned? Haircuts had to be approved and the same? How can you believe anything."

    Documenting people/governments/coprorations for the things they've actually done is the most we can ask for. Making shit up on the fly for a quick buck is the death of truth. It just enables them to deflect everything and anything.

    There's dozens of reasons to dislike/distrust North Korea. We don't need to make ones up.

    People who say things like "dozens of reasons" often list not a single reason. Trust me bro!

  • does anyone really think our freedom phones are far from this?

    Maybe the western world can be given some credit on being a tad more subtle, but overall the difference here are in tecnique, not goals

    Can you provide more information on how western governments are spying?

  • Say what you want about them but they're the only one who truely know how to deal with the right wingers. Look at Germany, they abolished the Stasi and not even 30 years later the nazi are as popular as ever

    Holy shit! Are you really unironically defending the North Korean government? Like, are you trolling?

    Woah. That's pretty wild. If you're not trolling, what country are you from and how would you describe yourself politically? Where do you get your news?

  • Its funny, a screenshot every 5 minutes that might be reviewed later on if needed sounds less intrusive than western efforts like google, amazon, etc.

    What kind of tankie bullshit argument is that lmao

  • does anyone really think our freedom phones are far from this?

    Maybe the western world can be given some credit on being a tad more subtle, but overall the difference here are in tecnique, not goals

    That's why laws like the GDPR exist to prevent this bullshit.

  • 1 Stimmen
    2 Beiträge
    0 Aufrufe
    A
    If you're a developer, a startup founder, or part of a small team, you've poured countless hours into building your web application. You've perfected the UI, optimized the database, and shipped features your users love. But in the rush to build and deploy, a critical question often gets deferred: is your application secure? For many, the answer is a nervous "I hope so." The reality is that without a proper defense, your application is exposed to a barrage of automated attacks hitting the web every second. Threats like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution are not just reserved for large enterprises; they are constant dangers for any application with a public IP address. The Security Barrier: When Cost and Complexity Get in the Way The standard recommendation is to place a Web Application Firewall (WAF) in front of your application. A WAF acts as a protective shield, inspecting incoming traffic and filtering out malicious requests before they can do any damage. It’s a foundational piece of modern web security. So, why doesn't everyone have one? Historically, robust WAFs have been complex and expensive. They required significant budgets, specialized knowledge to configure, and ongoing maintenance, putting them out of reach for students, solo developers, non-profits, and early-stage startups. This has created a dangerous security divide, leaving the most innovative and resource-constrained projects the most vulnerable. But that is changing. Democratizing Security: The Power of a Community WAF Security should be a right, not a privilege. Recognizing this, the landscape is shifting towards more accessible, community-driven tools. The goal is to provide powerful, enterprise-grade protection to everyone, for free. This is the principle behind the HaltDos Community WAF. It's a no-cost, perpetually free Web Application Firewall designed specifically for the community that has been underserved for too long. It’s not a stripped-down trial version; it’s a powerful security tool designed to give you immediate and effective protection against the OWASP Top 10 and other critical web threats. What Can You Actually Do with It? With a community WAF, you can deploy a security layer in minutes that: Blocks Malicious Payloads: Get instant, out-of-the-box protection against common attack patterns like SQLi, XSS, RCE, and more. Stops Bad Bots: Prevent malicious bots from scraping your content, attempting credential stuffing, or spamming your forms. Gives You Visibility: A real-time dashboard shows you exactly who is trying to attack your application and what methods they are using, providing invaluable security intelligence. Allows Customization: You can add your own custom security rules to tailor the protection specifically to your application's logic and technology stack. The best part? It can be deployed virtually anywhere—on-premises, in a private cloud, or with any major cloud provider like AWS, Azure, or Google Cloud. Get Started in Minutes You don't need to be a security guru to use it. The setup is straightforward, and the value is immediate. Protecting the project, you've worked so hard on is no longer a question of budget. Download: Get the free Community WAF from the HaltDos site. Deploy: Follow the simple instructions to set it up with your web server (it’s compatible with Nginx, Apache, and others). Secure: Watch the dashboard as it begins to inspect your traffic and block threats in real-time. Security is a journey, but it must start somewhere. For developers, startups, and anyone running a web application on a tight budget, a community WAF is the perfect first step. It's powerful, it's easy, and it's completely free.
  • Massaging the neck and face may help flush waste out of the brain

    Technology technology
    25
    1
    235 Stimmen
    25 Beiträge
    0 Aufrufe
    D
    Segue into sexy time
  • 6 Stimmen
    4 Beiträge
    0 Aufrufe
    T
    Oh I agree. I just think is part of the equation perhaps the thinner and lighter will enable for better processor? Not an AR guy , although I lived my oculus until FB got hold of it. Didn't use it ever again after that day.
  • Trump Taps Palantir to Compile Data on Americans

    Technology technology
    34
    1
    205 Stimmen
    34 Beiträge
    0 Aufrufe
    M
    Well if they're collating data, not that difficult to add a new table for gun ownership.
  • Google Shared My Phone Number!

    Technology technology
    45
    1
    145 Stimmen
    45 Beiträge
    0 Aufrufe
    M
    Italy, and all of Europe, have always had a greater respect for personal and a lesser respect for business' profits than the U.S.
  • 143 Stimmen
    30 Beiträge
    10 Aufrufe
    johnedwa@sopuli.xyzJ
    You do not need to ask for consent to use functional cookies, only for ones that are used for tracking, which is why you'll still have some cookies left afterwards and why properly coded sites don't break from the rejection. Most websites could strip out all of the 3rd party spyware and by doing so get rid of the popup entirely. They'll never do it because money, obviously, and sometimes instead cripple their site to blackmail you into accepting them.
  • 35 Stimmen
    16 Beiträge
    0 Aufrufe
    M
    This is what I want to know also. "AI textbooks" is a great clickbait/ragebait term, but could mean a great variety of things.
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    2 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry