this post was submitted on 23 Mar 2025
339 points (99.4% liked)

Privacy

1563 readers
728 users here now

Protect your privacy in the digital world

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be nice, civil and no bigotry/prejudice.
  2. No tankies/alt-right fascists. The former can be tolerated but the latter are banned.
  3. Stay on topic.
  4. Don't promote big-tech software.
  5. No reposting of news that was already posted. Even from different sources.
  6. No crypto, blockchain, etc.
  7. No Xitter links. (only allowed when can't fact check any other way, use xcancel)

Related communities:

founded 4 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Agent641@lemmy.world 44 points 2 days ago* (last edited 2 days ago) (10 children)

I need an android phone that logs me into one fake version of the operating system when I unlock it with one pattern, and another OS when I use my real pattern.

Like a virtual machine kind of deal where the attacker cannot know that there are other logins, or how many. Preferably with some kind of automated system that simulates normal usage so it looks real but boring.

[–] PlutoniumAcid@lemmy.world 18 points 2 days ago (4 children)

The novel Little Brother by Cory Doctorow comes to mind.

One PIN would log you into your real account, another PIN into a decoy account, and no indication of the other one existing.

That does not exist in the real world.

load more comments (8 replies)