This Phone Was Designed By The FBI To Catch Criminals - Anom Phone Hands On

Поделиться
HTML-код
  • Опубликовано: 13 май 2022
  • This smartphone was marketed as an encrypted secure device that "enforces your right to privacy". As it turns out the phone was developed by the FBI and AFP as a honeypot. Giving them the ability to read every message sent from the device. Among other things.
    -------------------------------------Socials------------------------------------
    Website: www.hughjeffreys.com
    Store: www.hughjeffreys.com/store
    Instagram: / hughjeffreys
    --------------------------------------Links--------------------------------------
    Get parts, tools and repair guides at iFixit:
    Shop US: iFixit.com/hughjeffreys
    Shop AU: ifix.gd/hughjeffreysau
    Tools I Use: www.hughjeffreys.com/tools
    Some of the sites referenced in the video:
    www.vice.com/en/article/n7b4g...
    online.afp.gov.au/ironside
    en.wikipedia.org/wiki/ANOM
    ---------------------------------------------------------------------------------------
    (DISCLAIMER: This description contains affiliate links, which means that if you click on one of the product links, l will receive a small commission.)
  • НаукаНаука

Комментарии • 4,9 тыс.

  • @jjpelham7548
    @jjpelham7548 2 года назад +16969

    The FBI should teach a masterclass in degrading public trust.

    • @UhOhUmm
      @UhOhUmm 2 года назад +805

      I would agree, if it didn't work. But unfortunately for some people this was a successful operation. So how is the public harmed? The public should buy phones from trusted manufacturers and just use encrypted messaging if they REALLY want that privacy.

    • @SatoshiAR
      @SatoshiAR 2 года назад +870

      Ironically no one in the US was arrested as part of this sting operation due to established privacy laws. The operation was more successful in Europe and Australia.

    • @jjpelham7548
      @jjpelham7548 2 года назад +699

      @@UhOhUmm What a hilarious response, classic victim blaming. Same vibe as "she shouldnt have been wearing a short skirt".

    • @SatoshiAR
      @SatoshiAR 2 года назад +8

      @@jjpelham7548 i mean you would have to be an idiot to immediately trust a device like this from a company with no history or background.
      Edit: why did you delete your reply?

    • @jjpelham7548
      @jjpelham7548 2 года назад +58

      @@SatoshiAR didn't delete reply. Yours is gone when I click see all replies aswell so I'd assume a glitch.

  • @ezengondolkozom3700
    @ezengondolkozom3700 2 года назад +13923

    This is why you should never trust proprietary software when talking about privacy.
    This is a golden example made by the FBI themselves

    • @botbeamer
      @botbeamer 2 года назад +485

      Right, verified Free and Open Source software is what we should look for 👍

    • @BlueRice
      @BlueRice 2 года назад

      Fbi, and Cia, are like rival.. actually more like democrats and Republicans.
      Then you have companies actually allowed and cooperate with them.
      At the end, they have you in controlled. They control your life in terms of how much money you can make, or harassing you indirectly

    • @whannabi
      @whannabi 2 года назад +78

      @@botbeamer and everyone can find vulnerabilities way faster

    • @jk-gn2fu
      @jk-gn2fu 2 года назад +350

      @@whannabi Not really. We are yet to see an epidemic of zero day attack on GNU/Linux servers because of vunerability of the OS even if the source code has been always open for everyone. There are many Linux servers that one can take indefinite amount of advantage. It's because there are limited methods one can use to break security, and security experts are usually smarter.

    • @Gameplayer55055
      @Gameplayer55055 2 года назад +154

      just throw away any computers and use wooden sticks and paper mail

  • @THEGOOD360
    @THEGOOD360 Год назад +1318

    Good thing the FBI would never make criminals out of ordinary people.....

    • @grace.by.fire2021
      @grace.by.fire2021 Год назад

      Hahahahah the fbi dea nsa HMI who all the alphabet agencies are criminals

    • @METATRON33
      @METATRON33 Год назад +16

      They hire them

    • @Daniel-ph7or
      @Daniel-ph7or Год назад +41

      @@METATRON33 They are criminals

    • @METATRON33
      @METATRON33 Год назад +1

      @@Daniel-ph7or they hire

    • @legendgames128
      @legendgames128 Год назад +74

      @@Daniel-ph7or Me: "I want privacy."
      You, an Oblivion NPC: "That means you are criminal."

  • @ratonbox
    @ratonbox 9 месяцев назад +354

    Even if the story wasn’t real, this is still a a masterclass, it makes it impossible for criminals to trust somebody else with the same privacy claims.

    • @SlimeJime
      @SlimeJime 9 месяцев назад +22

      most criminals don't trust phones to begin with

    • @danielduncan6806
      @danielduncan6806 9 месяцев назад +20

      "criminals to trust" Are you being serious right now? That is an oxymoron.

    • @Mordewolt
      @Mordewolt 4 месяца назад

      as anyone should? the claims are bogus, anyone with 5 minutes to spare on infosec youtube shorts can see how they are impossible

    • @Matt-jc2ml
      @Matt-jc2ml 2 месяца назад

      You can trust it if it's open source

    • @infiniteinspiration1628
      @infiniteinspiration1628 Месяц назад

      Yess😮😮😮😮😮

  • @sudonim7552
    @sudonim7552 2 года назад +9125

    This is why you can never really trust any "privacy" software if it isn't open source. Only open source allows you, the user, to ensure there is nothing sketchy going on.

    • @MartinBarker
      @MartinBarker 2 года назад +277

      Mega proved this wrong years ago. closed source and very much honor privacy that's why it was shut down because they did not share anything about anyone using it.

    • @bluezz5002
      @bluezz5002 2 года назад +195

      @@notlNSIGHT a filesharing service, notorious for its use by bad actors

    • @duckmeat4674
      @duckmeat4674 2 года назад +370

      @@MartinBarker its the exception not the rule. And you are still better off just using local disk, or running your own nextcloud instance

    • @jwalster9412
      @jwalster9412 2 года назад +59

      Unless, there's a hidden closed source within the open source.

    • @sol_in.victus
      @sol_in.victus 2 года назад +66

      @@paimonbutter they're talking about megashare, i dont know if mega is related to it, it might.
      But its irrelevant anyways because its not the same not sharing how your back end works than not showing who are the users and what they're sharing.
      You can have an open source software that doesnt share user data like signal and you can have close source software that shares your data like... any major app basically

  • @11Bbq
    @11Bbq 2 года назад +6285

    While not for crimes, being able to either switch between work and personal phone on the same device or safely know you’re not being tracked by 100 apps would be pretty cool.

    • @kooll2401
      @kooll2401 2 года назад +78

      I mean for the most part it's doable

    • @koala2587
      @koala2587 2 года назад +274

      Iirc Huawei phones had this function -- typing a special passcode opens a "second" interface and you could install apps and log in to different accounts.

    • @whannabi
      @whannabi 2 года назад +469

      @@koala2587 but it's a Huawei tho

    • @koala2587
      @koala2587 2 года назад +101

      @@whannabi true dat loll but I'm just saying the feature is actually pretty doable, at least on Android

    • @aobunau
      @aobunau 2 года назад +59

      my xiaomi has this thing where i can do a gesture to open a "hidden apps" folder & each of those apps has a special passcode

  • @darkwoodmovies
    @darkwoodmovies Год назад +675

    I wonder what the legality of something like this is. If this ever got sold to and tracked someone without a warrant, I feel like this would be a massive invasion of privacy and overreach by the government, and end up in a lawsuit that could easily work its way to the Supreme Court.

    • @pst9821
      @pst9821 Год назад +194

      Oh youre so naive

    • @user-ep3bb9fk6n
      @user-ep3bb9fk6n Год назад +81

      welcome to the 21st century

    • @Fvcky0uverymuch
      @Fvcky0uverymuch Год назад

      They did... just keep watching I'm about to put my foot into someone's ass for exactly that

    • @bolt4685
      @bolt4685 Год назад

      the legality of it is that the government can do whatever the fuck they want lol

    • @marcogiacomelli3625
      @marcogiacomelli3625 Год назад +69

      @@user-ep3bb9fk6n welcome to *America

  • @NerdOnTheStreet
    @NerdOnTheStreet Год назад +99

    I wonder if this system breached any open-source licenses, since it contained what appeared to be builds of open-source software but was apparently closed-source.

    • @ImRandomDude
      @ImRandomDude Год назад +1

      you answered yourself there

    • @jonathanberkeley4109
      @jonathanberkeley4109 Год назад +35

      The fact the display open-source licenses button doesn't work is also going to breach nearly all open-source licenses.

    • @Fvcky0uverymuch
      @Fvcky0uverymuch Год назад +2

      Yes it has

    • @Spartanhero613
      @Spartanhero613 Год назад

      LineageOS (if it is based on that) is under the Apache license (non-copyleft), so in this case I believe there's no violation with not distributing source code

    • @Spartanhero613
      @Spartanhero613 Год назад

      @@jonathanberkeley4109 lol nevermind

  • @astupidmidge
    @astupidmidge 2 года назад +10004

    If you think iOS is restrictive or locked down enough, ArcaneOS makes iOS feel like Android in comparison

    • @neelb980
      @neelb980 2 года назад +736

      Apple is taking notes don't worry

    • @subliminalvibes
      @subliminalvibes 2 года назад +91

      Haha. It's funny because it's TRUE! 👍😆

    • @jjcoolaus
      @jjcoolaus 2 года назад +191

      I have both ios and Android and ios isn't that restrictive these days. You can even run Linux apps on it through ish

    • @neelb980
      @neelb980 2 года назад +350

      @@jjcoolaus sideloading is the biggest thing for me. IOS makes it much harder to do anything of that sort. That and proper customization

    • @supercellex4D
      @supercellex4D 2 года назад +30

      does it make Android look like Windows?

  • @HughJeffreys
    @HughJeffreys  2 года назад +4208

    I did a unit in Cyber Security last year at uni and got an answer wrong on a quiz about which is the more secure option. Open or closed source software? The teacher said I was wrong in saying open source software is better for security and privacy. (As long as its kept up-to-date) He argued if the code was hidden people couldn't find vulnerabilities... Thought that was one of the biggest points to open source software. Especially allowing people to see if there is any backdoors. There is advantages to both but still I would of liked to show him this one to emphasise my point.

    • @Ivy-pe2wz
      @Ivy-pe2wz 2 года назад +2

      Your professor is a typical old timer brainwashed by Microsoft propaganda of the early 2K. No self-respecting security researcher believes in security through obscurity anymore.

    • @izzieb
      @izzieb 2 года назад +459

      I think open-source can be more secure, but with a caveat that that is only true provided people vetting the changes to the particular piece of software actually fully understand the code being altered or added.
      There have been quite a few times where researchers have added "malicious" code to projects to show the pitfalls of the vetting process.
      Despite that, it's still better than security-by-obscurity, which is basically what your teacher is referring to. It's definitely considered a bad practice. There will always be someone capable of reverse engineering the software and finding holes, even without the source code.

    • @remotecontrolaholic
      @remotecontrolaholic 2 года назад +420

      You didn't get the answer wrong, he did. Intelligence agencies and security companies love to use open source software as it's verifiable by people all over the world, not to mention it's not tied down by the same restrictions as closed source software. Keeping your source private, for basic systems like a kernel, just means only your team is putting time into verifying it. Security by obscurity is no security at all.

    • @bluegizmo1983
      @bluegizmo1983 2 года назад +328

      Open source is ABSOLUTELY more secure than closed source software. Your teacher is definitely wrong and obviously biased. Claiming "if the code is hidden people can't find vulnerabilities" is total BS and proven so by the fact people find vulnerabilities in closed source software all the time!

    • @rajder656
      @rajder656 2 года назад +47

      i agree but only when it comes to more popular projects. The smaller the community gets the less advantages open source software has

  • @VeritasEtAequitas
    @VeritasEtAequitas Год назад +16

    Someone, somewhere, must still have one of these with the calculator in installed which could be dumped from the memory chip and reverse engineered. For bonus points, use Ghidra which the NSA released publicly.

  • @berbtheguy
    @berbtheguy Год назад +14

    Fun fact, the author of that same article contacted the FBI about the phone being watched. Little did he know.

  • @Zulf85
    @Zulf85 2 года назад +5223

    I'd love a system like this with two pins on a phone - it seems a lot faster than different user accounts. kind of a shame the only option is a honeypot lmao

    • @zuccx99
      @zuccx99 2 года назад +149

      most phone have a parallel space option (at least my mi11 has it and my mate 20 pro had it too)

    • @defnotatroll
      @defnotatroll 2 года назад +214

      I know Xiaomi flagships have this sort of feature where you open a different space depending on what finger you use to unlock the phone

    • @Zulf85
      @Zulf85 2 года назад +37

      @@defnotatroll that's so cool! I had no idea

    • @PinotNoir_
      @PinotNoir_ 2 года назад +34

      most xiaomi phone have dual space like this

    • @GabrielValentino111
      @GabrielValentino111 2 года назад +15

      Yup, you can assign different passwords to each space

  • @txma.
    @txma. Год назад +2454

    Imagine being a regular person just spending more money for privacy then having all your messages read by authorities 🗿

    • @Decommissioned
      @Decommissioned Год назад +178

      It wasn't for regular people though. It was marketed to criminals, mostly on darknet sites.

    • @GraveUypo
      @GraveUypo Год назад +355

      @@Decommissioned pretty sure i saw ads and/or reviews for arcaneOS here on youtube

    • @slyguythreeonetwonine3172
      @slyguythreeonetwonine3172 Год назад +259

      What? No if you want privacy you are clearly a criminal.🙄

    • @ric84
      @ric84 Год назад +240

      @@slyguythreeonetwonine3172 I'm assuming this is either bait or sarcasm. However the fact that a sizeable amount of the population really thinks like this makes me unreasonably angry and i truly hope for an uprising one day.

    • @TheBestRobotEver
      @TheBestRobotEver Год назад +16

      @@ric84 What

  • @KnellAnwyll
    @KnellAnwyll Год назад +98

    I do cyber security, and i can confirm that there is nothing on earth that is "Secure" when it comes to anything that has a relation with a SERVER.

    • @gastonbell108
      @gastonbell108 Год назад +2

      You do cyber security when you're not being a Russian EDM superstar?

    • @KnellAnwyll
      @KnellAnwyll Год назад +14

      @@gastonbell108 Music is fun, but building a business and a social media platform has more purpose.
      thanks for the compliment tho, I will one day go full on making it big in Russia

    • @charles2521
      @charles2521 9 месяцев назад

      There is one particular brand that is deeply hated by the American government for not allowing them to spy so easily.

    • @savanluffy5223
      @savanluffy5223 9 месяцев назад

      what about when you delete your account. e.g twitter account. the company is forced to delete database data after a specific amount of time? @@KnellAnwyll

  • @sannyassi73
    @sannyassi73 Год назад +39

    Made by Criminals to catch other Criminals.

  • @Slap0
    @Slap0 2 года назад +1610

    I remember seeing these phones at launch. Marketing them as super secure and privacy focused. I almost picked one up. I remember reading an XDA thread stating something about how odd it was when they got a copy of it.

    • @uncrustable9923
      @uncrustable9923 2 года назад +245

      damn that's scary you almost PAYED for that

    • @stschannelt1476
      @stschannelt1476 2 года назад +18

      Wow wtf

    • @tissuepaper9962
      @tissuepaper9962 2 года назад +410

      @@uncrustable9923 and the worst part is that no serious criminal would use a closed source "privacy" OS because that's literally an oxymoron. Calyx or Graphene on a newish pixel is super easy to do. They shipped 11,000 phones and only caught 300 people, and how many of those do you think were harmless neighborhood pot dealers? The next time somebody tries to argue with me that Australia isn't a police state, I will send them this video.

    • @uncrustable9923
      @uncrustable9923 2 года назад +12

      @@tissuepaper9962 facts, although he usually ships his devices from the us to au so I'm not sure if they were doing this in Australia

    • @mitchell3230
      @mitchell3230 2 года назад

      @@tissuepaper9962 what do you mean? They only built cases against people with significant evidence who’d incriminated themselves with crimes not just pertaining to drug dealing. All because they thought they were smart by buying a special phone to do illegal activities. No backyard drug dealer is gonna drop $2000 on a phone that no customers own. They have a Snapchat and iMessage and understand that those services are 128-bit SSL encrypted. The only people who were buying these phones were doing so because they believed that what they were doing was so incriminating that they became paranoid of the services they were using and were willing to fork over a fortune for some unique service. And if you’re trying to make the argument regular people bought it because only 300/11000 were charged, well that’s because not everyone incriminated themselves. There were stupid teenagers who were dumb enough to incriminate themselves but most were smart enough to still be careful with their wording so a case couldn’t be built against them. Also this is the best example of Australia being a police state? People voluntarily overlooking red flags and purchasing a product to incriminate themselves? That’s worse than America and the NSA using Google services to track users who were not warned beforehand and had no red flags to indicate that they were being tracked? If anything America is a far more targeted, efficient and powerful police state than Australia could ever dream to be and unlike Australia they get to excuse it by saying they’re “preventing terrorism” . A get out of jail free card Australia doesn’t have. At the end of the day Australia found a cheeky solution to a problem and you’re upset because you didn’t think they had the smarts to do it.

  • @alexander1989x
    @alexander1989x Год назад +560

    The reason most apps and functions like sending messages, call out and saving contacts don't work is because all that data is saved in cloud, albeit FBI's cloud. Since that cloud server is down, none of the apps can save that data and thus crash at any command. I guess the Clock app is the only one that doesn't need its data stored.

    • @SF-dy6hn
      @SF-dy6hn Год назад

      you'd be wrong the clock app is the most used feature every action is coreleated to the allmighty time stamp and it's the single largest factor in making sense of the noise. without the time stamp your gps data would be jumbled your call logs wouldn't make any sense. Not a single app can be trusted especially the tik tok of the all mighty clock

    • @Termsofseve
      @Termsofseve Год назад +39

      it's a decoy mode, more likely the apps are just shells designed to be as small as possible

    • @BokBarber
      @BokBarber Год назад +50

      This makes allot more sense, seeing as no authority who poked around that non-functional "decoy mode" for more than 2 seconds would buy it.

    • @OtakuUnitedStudio
      @OtakuUnitedStudio Год назад +1

      @@BokBarber Unless they were trained to know what it meant. It could very easily have been an intentional dog whistle.

    • @Sammysapphira
      @Sammysapphira 4 месяца назад +1

      God please stop using the word cloud to refer to a server.

  • @harrasika
    @harrasika Год назад +9

    It wasn't only the FBI that worked on this though. Europol and the Australian Federal Police were also involved (and others). Thus why there were arrests made in Europe and Australia. The FBI didn't do it behind the other countries' backs.

  • @alexbahder
    @alexbahder Год назад +128

    Honestly, this is why open source is so important... Closed source means you don't know what it's doing, and can't find out (at least not easily).
    Edit: Damn, not going to lie, the "decoy pin code" is actually a cool idea for a normal phone. :P Get your files / apps, etc., complete setup hidden for a "work mode" or something like that, simply swapped based on the pin code entered.

    • @WorksOnMyComputer
      @WorksOnMyComputer Год назад +5

      It was based on open source software. How did that make it safer?

    • @retropcs88
      @retropcs88 Год назад +4

      Xiaomi phones have a "dual space" where you can set it up as a second phone and you allocate how much storage you want for it. It's pretty neat

    • @J-wm4ss
      @J-wm4ss 5 месяцев назад +2

      most android oses/stock android supports multiple users and a "work mode" that's enabled by companies if you connect their email to your phone. there's also apps that simplify that process (like Shelter) and do just that.

    • @sgtjonzo
      @sgtjonzo 4 месяца назад +2

      ​@@WorksOnMyComputerdoesn't matter what it's based on, if it's not open source, its not open source

    • @infiniteinspiration1628
      @infiniteinspiration1628 Месяц назад

      Bless you 🙏🏼

  • @PvblivsAelivs
    @PvblivsAelivs Год назад +1410

    The whole interface screams "trap." Just as a privacy enthusiast, I would want a "decoy" mode and a "secret" mode. The "decoy" mode should let you show government agents that you have "nothing to hide" and should function like people expect a phone to function. The apps should work. And a regular government agent should not have any reason to believe there is anything else under the hood. The "secret" mode should also be fully functional. It should just store, encrypt, and possibly transmit encrypted things you don't want prying eyes to see.
    Maybe the sting operation provided apparent functionality. But otherwise, I don't see how they got their targets to use this.

    • @gio-ve7vn
      @gio-ve7vn Год назад +185

      i'm guessing no one was using this phone for anything outside of the texting app. it basically worked as a burner phone. But you have a very good point about the decoy mode being suspicious as hell.

    • @kishascape
      @kishascape Год назад +49

      Don't even have to look at the phone. If you're buying a prebuilt you should only go from a reputable brand or source. Some new gimmick device appearing out of thin air already gives that away. GMSK has been making actual security phones for decades now and no reason to defer from that.

    • @PvblivsAelivs
      @PvblivsAelivs Год назад +51

      @@kishascape
      It really is hard to be sure. A "reputable source" may be quietly giving the government all your data anyway. Anything people are a little _too_ confident about makes me leery.

    • @testname4464
      @testname4464 Год назад

      @@kishascape how do we know GMSK haven't defected and started feeding the government your data? How do we know that feds haven't already installed a backdoor on their devices? They've already done it with Apple

    • @terracar2003
      @terracar2003 Год назад +37

      Yeah I'm not sure if I'm missing something in this video but I feel like the kind of person who would buy a phone like this would figure out it was bugged in about 30 seconds at most

  • @rolls_8798
    @rolls_8798 2 года назад +1521

    I think this is just proof that if you want something truly secure, it has to be open source and transparent to the user.
    i mean, hell, companies even decline alerting their customers when they've been hacked just because they'd look bad

    • @rollerskdude
      @rollerskdude 2 года назад +40

      Little do they know that doing so only makes them look worse.

    • @rolls_8798
      @rolls_8798 2 года назад +1

      @@rollerskdude well... not if no one ever finds out. but yeah, absolutely terrible, but unfortunately I think a lot of users are sheltered even when the news breaks that their favourite big corp has been up to fuckery.
      partially, they get a little blind to faults, and the big corps themselves are the ones distributing and controlling news and media, being a big corp also makes you seem a little infallible and you sort of set the rules of what is justified or moral and people just go with it. which is fucked by the way

    • @mkultrasoldier
      @mkultrasoldier 2 года назад +24

      Sadly there are basically no phones that are. Even the most libre of phones usually have a proprietary modem, and these modems are fully capable of interacting with the SIM card, and receiving/sending SMS (a lot of weird carrier behavior uses this functionality.) I remember reading a really interesting piece on this but can't for the life of me find it now.
      SIM cards can even run embedded Java apps using the Java Card target, which I find terrifying.

    • @Nevergofullretard321
      @Nevergofullretard321 2 года назад +7

      NordVPN moment.

    • @TealJosh
      @TealJosh 2 года назад +9

      This is flawed thinking. Open source CAN lead to the best possible security and privacy, but it's not a guarantee. The user is the most unimportant part of the equation, because the user is always the weakest link. User also doesn't have to source code on their device. The most likely scenario to succeed is a small piece of software used by small group of users for a niche use case. Or a widely adopted software with thousands of security researchers poking at it. I would favor the first one and it doesn't have to be open source.

  • @dmon728
    @dmon728 Год назад +9

    First glance: ah yes, the google logo.. I trust my privacy is safe with this device

  • @ExpandedCuber
    @ExpandedCuber 11 месяцев назад +7

    Thanks man I was gonna buy one of these for all my crimes, good to know I shouldn't.

  • @BoiLeek
    @BoiLeek 2 года назад +788

    I’m impressed by how in depth u went in exploring every nook and cranny in the phone’s OS and trying to find a crack in the system, this is quality content

    • @procactus9109
      @procactus9109 Год назад +3

      How about opening it up and JTAG it

    • @gastonbell108
      @gastonbell108 Год назад +15

      LOL. "every nook and cranny" would have been taking the board out and bench hacking it. He just clicked on all the buttons and reported if they worked or not.

    • @procactus9109
      @procactus9109 Год назад +2

      @@gastonbell108 it's interesting to see different channels gain attention of tards that just can't think for themselves. But at least there is no cock sucking pose on the thumbnail.

    • @BoiLeek
      @BoiLeek Год назад +1

      @@gastonbell108 bro took it too literally 💀

    • @SweetBabyJesusOnTheCross
      @SweetBabyJesusOnTheCross Год назад +5

      ​@@BoiLeek well since you literally said "every nook and cranny" how else was he supposed to take it? Because that shit wasn't even close to being done "half-assed" let alone being a thorough exploration of the phones capabilities. So basically...you said something stupid, somebody told you it was stupid, and instead of admitting it was stupid, you tried to make them look stupid, which only made you look more stupid than you already were. Yeah, that seems about right.

  • @usrbinluna
    @usrbinluna 2 года назад +189

    FYI: ArcaneOS was the old name for Project Arcana, a pretty popular, feature-rich custom rom. It's literally just that, with some apps removed and a custom calc.

  • @boardingshorts9479
    @boardingshorts9479 Год назад +5

    i like how he gets straight to the point. +1 sub.

  • @SadiqUrRehmanKhattak
    @SadiqUrRehmanKhattak Год назад +14

    Well there is 3rd mode also available, on a master pin you can access full admin mode, where you can manage both of the main and decoy modes and make some changes as well…

    • @gust7447
      @gust7447 Год назад

      More info pls ):

  • @IngwiePhoenix
    @IngwiePhoenix Год назад +80

    Using the pin code to switch users is super neat. Would legit want this as a feature!

    • @reeepingk
      @reeepingk 11 месяцев назад +13

      Would be great for a parent with kids.

    • @SSFallingTTB
      @SSFallingTTB 2 месяца назад

      The android OS actually has an "Accounts" feature which allows this.

    • @lowelldiggs
      @lowelldiggs 2 месяца назад

      ​@@SSFallingTTBhow do you?

    • @tymmbearded544
      @tymmbearded544 2 месяца назад

      @@lowelldiggs Android actually allows you to set up multiple users account on a single device.

    • @lowelldiggs
      @lowelldiggs 2 месяца назад

      @@tymmbearded544 how do you?

  • @Marcos87600
    @Marcos87600 2 года назад +843

    Use EDL mode to install custom firmware. EDL mode or Emergency Download mode is a mode that gives you full access to EVERYTHING (and i dont think they can remove edl mode because its a snapdragon feature.) You might need to open up the phone and short a test point to ground though or get an EDL cable, but i don't think that will be a problem for you :)

    • @pierreuntel1970
      @pierreuntel1970 2 года назад +77

      I'm not sure about the Pixel's secure boot mechanism... but if its bootloader is currently expecting some specifically signed image then you won't be able to replace it with another one, even when you pull the chip out and reflash it

    • @Marcos87600
      @Marcos87600 2 года назад +41

      @@pierreuntel1970 I suppose that makes sense. I think it might be possible to unlock the bootloader in EDL.

    • @ickipoo
      @ickipoo 2 года назад +89

      @@pierreuntel1970 EDL mode is a feature of the SoC, and should allow the secure bootloader to be replaced. I'm really curious to know if Hugh can pull this off.

    • @pierreuntel1970
      @pierreuntel1970 2 года назад +28

      @@ickipoo don't you know even the bootloader is signed? there are fuses in the CPU for the factory to burn the first signature of the chain-of-trust, you can't just replace the bootloader without it's being properly signed, the CPU will refuse to continue

    • @Marcos87600
      @Marcos87600 2 года назад +45

      @owo グーチmoshi :) 9:26 it says in the bootloader: "Device state: locked" so no the bootloader isn't unlocked.

  • @catcoder12
    @catcoder12 11 месяцев назад +8

    When it comes to security, nothing beats open source.

  • @___Hermitage
    @___Hermitage Год назад +125

    When you consider the measures being taken by these people to catch "criminals," one naturally begins to question who the real criminals actually are.

  • @inkmime
    @inkmime 2 года назад +757

    I can't exactly pinpoint *all* the exact reasons (which there are a lot of) but this seems both highly unethical and also possibly extremely illegal but I mean hey as long as it's the FBI doing it right?

    • @notyourbusiness1352
      @notyourbusiness1352 2 года назад +218

      ikr? For non-criminals this is disgusting. Also, phones get shipped out to overseas, so FBI still keeps an eye on other nationals?!? It makes me hate FBI and the US gov in general.

    • @inkmime
      @inkmime 2 года назад +219

      @@notyourbusiness1352 What's absolutely hilarious to me among all this is that from what I can tell, criminally charged or not, you get like absolutely completely scammed like that is about $2000 down the shitter for a phone that is essentially a brick hahaha!
      The final 'update' should have literally just been the phone booting to an ASCII image of a middle finger with the text "Get fucked" underneath

    • @alf3071
      @alf3071 2 года назад +76

      who's gonna investigate the fbi? the fbi? lol

    • @archieames1968
      @archieames1968 2 года назад

      Its just like how the government is the biggest distributor and hoster of CP but as long as they're doing it its okay.

    • @bishplis7226
      @bishplis7226 2 года назад

      nukes and chemical weapons and the kkk are also illegal, so what? thats what usa is founded on!

  • @Gen2Red
    @Gen2Red Год назад +391

    Regardless of whether its used to catch criminals or not, this is a major breach of privacy rights. Disgusting.

  • @freqenc
    @freqenc 9 месяцев назад +1

    Teamwork makes the dream work. Nuff said.

  • @iamtheonewhoknox
    @iamtheonewhoknox Год назад +89

    They really went through millions of private messages to catch a couple of petty criminals WOW. we live in a dystopia

    • @TBH_Inc
      @TBH_Inc Год назад +22

      Considering the video mentioned thousands of pounds of drugs, and tens of millions of dollars of illegally acquired currency, I’m not sure how “petty” those criminals were.

    • @plastovyplast7965
      @plastovyplast7965 Год назад

      No, you are not right. en.wikipedia.org/wiki/ANOM

    • @cherrypepsi2815
      @cherrypepsi2815 Год назад +28

      @@TBH_Inc people saying "if you have nothing to hide" is the issue. Do you want them looking through _your_ shit _looking_ for reasons to arrest you?
      It's a violation of basic human rights in basically every civilized country.

    • @miguelnascimento2847
      @miguelnascimento2847 Год назад +4

      @@cherrypepsi2815 to those people one just has to say that if there is nothing to hide there is no reason for government agencies to be spying but they wouldn't get it anyway, some people were born to be slaves and that would be ok if they didn't also want everyone else to become one, the further time goes on the more reinforced I'm in this belief

    • @cherrypepsi2815
      @cherrypepsi2815 Год назад

      @@shinrapresident7010 Dude, I'm making a point in agreement with the guy I replied to, you dipshit
      How about you go reply to someone whose actually doing stupid shit

  • @Hebdomad7
    @Hebdomad7 2 года назад +113

    The Australian Federal Police making plans with the FBI over beers... sounds about right.

    • @mattelder1971
      @mattelder1971 2 года назад +4

      Yeah, but was it Budweiser or Fosters?

    • @syxepop
      @syxepop 2 года назад +1

      @@mattelder1971 - probably BOTH! 🍻🍻🍻

    • @GabrielTobing
      @GabrielTobing 2 года назад

      Lol XD

    • @hellblazer275
      @hellblazer275 2 года назад

      @@mattelder1971 fec off with you're piss water! we send that shit to america for a bloody reason!

    • @SilvaDreams
      @SilvaDreams 2 года назад +4

      @@mattelder1971 Australians don't even drink Fosters.. They just export that crap.

  • @erikwright6539
    @erikwright6539 2 года назад +261

    "There isn't any way of knowing what it's doing behind the scenes" is terrifying and that they're capable of doing that with only software all of this could be featured in our next software update

    • @someoneout-there2165
      @someoneout-there2165 2 года назад +14

      My ex has government clearance and has people remotely control my phone.. we broke up over 10 years ago.. yeah.. he's completely sane. 😂

    • @awaitingconfirmation8406
      @awaitingconfirmation8406 2 года назад +23

      Bold of you to assume that these functions aren't already in our devices

    • @daxhopkins7312
      @daxhopkins7312 2 года назад +3

      Or our last update

    • @filipebeat
      @filipebeat 2 года назад +2

      it already is like this since ever

    • @ThePandaKingFTW
      @ThePandaKingFTW 2 года назад +29

      @@someoneout-there2165 No chance that could happen. I dont doubt the government has that ability, but the amount of red tape you would have to go through would make petty revenge on an ex impossible lmao. No single person has that power

  • @eveadams8028
    @eveadams8028 6 месяцев назад +1

    It is basically the same thing with free phones and service for those who are on some government assistance program. Snap, SSI, ssdi, accessing and monitoring everything you do, limited settings, I ended up putting tape over the cameras. I turned off location and microphone. But I doubt it turns it off.

  • @KAXGaming
    @KAXGaming Год назад

    My Huawei Black Shark 5 has the option for Dual Apps & Dual Locks. I have two different profiles I can sign into with two different pins at the lock screen.
    They can also be accessed with different Fingerprints as well.

  • @Reinreith
    @Reinreith 2 года назад +1051

    I mean....unironically the decoy and regular pin is a very good idea and would be great for casual use for business uses
    My mother has a business phone that has personal and business uses, but getting to personal from business is easy AF and considering the business requests she gives that phone to other people while working it's definitely not secure
    It'd also just be a good thing for NDA business ideas like artists and designers, allowing people to still use biometrics and be asleep and not worry about someone using their thumbprint to get in
    Also just keeping NSFW stuff from kids or making it to where you have to buy apps from the main but still let you use them on the decoy to avoid kids spending money or seeing stuff they shouldn't while still having that convenience of biometrics
    Sure there's security folders but I feel like this would help even more
    Kinda sucks that for someone like me who believes in privacy and would probably buy this for that privacy would get burnt by the government because I just want freedom from prying eyes

    • @mcslender2965
      @mcslender2965 2 года назад +30

      Which is why it's best to use open source privacy tools

    • @HughJeffreys
      @HughJeffreys  2 года назад +194

      Android has options for seperate users. So you could configure a home and work profile. Not a complete replacement for what this phone has but its similar.

    • @Reinreith
      @Reinreith 2 года назад +40

      @@HughJeffreys I actually didn't know that. Shows just how needed these videos you make are for people who even think their relatively tech savvy, cheers
      But that only makes me look at the work phone my mother was given with more disgust, there is no difference between the two besides a single pin and once it's used its open until the phones reset working like a big security folder

    • @Spookex166
      @Spookex166 2 года назад +17

      Had something like that on my Xiaomi, had different users depending on if I unlocked it with one finger or the other

    • @rolls_8798
      @rolls_8798 2 года назад +5

      @@Reinreith samsung secure folder is pretty good imo and looks like it has everything you are looking for. can use separate biometrics or passwords for it and you can have it lock up only when you tell it to, every time you close it, once the phone has been turned off, or after a set period of time

  • @TDAdvocate
    @TDAdvocate 2 года назад +253

    This is why a device like the PinePhone is one of the most secure devices on the market. It is almost (if not) entirely open source, has physical killswitches for hardware features, easy OS swapping, etc. If it ain't open source then it ain't safe.

    • @kodyballard49
      @kodyballard49 2 года назад +10

      Purism Librem 5 is another incredibly secure phone

    • @DorperSystems
      @DorperSystems 2 года назад +38

      @@kodyballard49 Librem 5 and Pinephone are extremely unsecure. Installing a malicious program allows said program to replace the bootloader and baseband with a rootkit from it's installation script. Heck, you don't even need root. All you need to do is change the user's $PATH to point apt to a malicious program and on update it will run the malicious program which runs with superuser privileges if sudo isn't compiled with secure-path enabled. Compare to closed-source QNX-based BB10 which has had 0 root exploits ever.

    • @ahsokaincognito
      @ahsokaincognito Год назад +38

      Open source won't prevent this since the devs can just compile a different source and obfuscate the binaries. Since the audience for these is very small, someone discovering inconsistencies by chance is low.
      Additionally you can also keep critical code on the serverside if possible.
      The political censorship programme in MIUI was discovered years after Xiaomi had grown into a giant company, and it's still not entirely clear what they are doing.

    • @wolfetteplays8894
      @wolfetteplays8894 Год назад

      Closed source is actually safer because it’s harder to hack, stop being brainwashed by propaganda

    • @freedomneverexisted5093
      @freedomneverexisted5093 Год назад +6

      I think there is a FBI in the comments xd

  • @williamlebotschy2729
    @williamlebotschy2729 Год назад +2

    Reminds me of the Scotland Yard operation to create a dark website for criminals. It was in operation for 15 years, before the police struck. During this time it gained the trust of criminals.

  • @sudoalex
    @sudoalex Год назад +80

    If you want an actual private phone, you should always ask for the source code if the OS and compile it yourself. Also this OS was clearly based on LineageOS so they're breaking the license by not open sourcing the code and even worse if they didn't include a copy of the licenses.
    I think only s stupid criminal would fall for this one, hopefully not a cyber criminal since they're supposed to be tech savvy

    • @alabasterharmony6268
      @alabasterharmony6268 9 месяцев назад

      proof it's based on Lineage?

    • @I_Love_Learning
      @I_Love_Learning 9 месяцев назад +14

      @@alabasterharmony6268 While there isn't any hard proof, due to this being closed source, it sure does look like it.

    • @zombie_pigdragon
      @zombie_pigdragon 7 месяцев назад +4

      @@I_Love_Learning I did wonder a bit about that; given that the "OSS Licenses" page is broken in at least one of the apps, it's very possible this phone's software violates copyright law by failing to comply with the license of at least one included app or service.

  • @ungabunga7879
    @ungabunga7879 2 года назад +42

    how any criminals could trust it in the first place is beyond me, If i was a criminal, my first thought would be "Sting operation"

    • @UncleKennysPlace
      @UncleKennysPlace 2 года назад

      Because most criminals are stupid.

    • @whannabi
      @whannabi 2 года назад +3

      Guess they thought it would be too "crazy" to imagine or "paranoid" for some.

    • @Nitrogang
      @Nitrogang Год назад

      A lot of them are really dumb and don't know anything about the tech world.

    • @Journey_Awaits
      @Journey_Awaits Год назад +7

      They forced a known criminal to distribute them who already gave out encrypted softwares

  • @Damascus_404
    @Damascus_404 2 года назад +48

    My wife use to work for Sony-Ericsson, we have some preproduction/experimental models floating around from the early-mid 00's, one even use to receive an sms once a month saying something like please return this phone to SE as it's not a production model. None of them work given the change in edge/2g/3g stuff, but love the pre-iphone designs and feel of them.

  • @ProGaming-bm6ff
    @ProGaming-bm6ff Год назад

    Thanks for alerting the criminals

  • @sarahkitty4729
    @sarahkitty4729 Год назад

    The best os is one you build yourself and build it to keep no logs, every os has forensic friendly components and services dedicated to gathering intel on people, learn to disable them and make a incognito os

  • @dandelion4454
    @dandelion4454 2 года назад +22

    when the government does this, they get applauded, *especially* if it's "to catch bad guys", but when i do this I get sued and jailed. the fuck

    • @dandelion4454
      @dandelion4454 2 года назад +4

      @@mlx39996 no. my point is that it is not ok to do illegal shit to catch people doing illegal shit. seems pretty hypocritical to me that on one hand, you have this; then on the other, poisoned tree doctrine.

    • @itsalwaysdarkestbeforethes1198
      @itsalwaysdarkestbeforethes1198 2 года назад

      This seriously lol, fuck criminals they have it coming

    • @Fixer_Su3ana
      @Fixer_Su3ana 2 года назад +4

      @@mlx39996 It's more about having a fair standard law that applies to everyone equally, because the 'bad guys' is a broad unuseful term when everyone involved is in violation of the law. Yesterday it could be applied to drug dealers and organized crime, Today and Tomorrow it could be applied to oppressed people organizing to resist a tyrannical government that singles them out for their race, religious beliefs, political affiliations, or immunity to the usual methods of social engineering.

    • @DorperSystems
      @DorperSystems 2 года назад +1

      When I arrest someone it's "kidnapping" but when the police do it is legal. WTF????

    • @Fixer_Su3ana
      @Fixer_Su3ana 2 года назад

      @@mlx39996 Technically, it is legal, even encouraged for you to do such things in an emergency too. You can exceed the speed limit to avoid getting hit by a vehicle and even run a red light if staying where you are would get you or others killed. Ambulance drivers are not law enforcement, they are not even a part of the government, yet they are allowed to do these things.

  • @digitalchaos1980
    @digitalchaos1980 2 года назад +385

    Unless I missed it, what I don't understand is how the FBI expected someone to use that phone without being suspicious of why nothing works or can be done on it. 🤔

    • @awaitingconfirmation8406
      @awaitingconfirmation8406 2 года назад

      Most criminals are very, VERY dumb.
      The main selling point of this phone was that secret messenger app in the calculator.
      They thought that by using that app and the "privacy focused" phone, they could stop the authorities from listening in on their conversations.
      Because the criminals only wanted the phone for the messenger, all the other apps were put there for show in case someone else looked at their phone I guess

    • @NoName-je3cz
      @NoName-je3cz 2 года назад +48

      I suppose this is some kind of a beta project. It definitely looks unfinished, although it has much potential if done well

    • @mdmd--_____--9191
      @mdmd--_____--9191 2 года назад +150

      Was supposed to work like that. It was marketed as ultra secure, no gps so no tracking, no ability to call so no wire taps and no non encrypted messages so no-one in the organisation could be sloppy, while looking like a normal phone to outsiders. Only anom the encrypted app was to work for communication.

    • @filipebeat
      @filipebeat 2 года назад +6

      ds is just to make peepoo think they dont already have access to all devices

    • @ThePandaKingFTW
      @ThePandaKingFTW 2 года назад +82

      That was the whole point lmao. It was marketed as a secure and locked down communication device for criminals. Nothing more. Not meant to play games on or casually text your friend. More like for drug lords to coordinate hits with high ranking members. While still looking like a normal phone from the outside if it were stolen

  • @michaelman9358
    @michaelman9358 Год назад +1

    When they gave me this phone I knew it was fishy. Still have it this day, used only for 2 weeks, then got too paranoid to use it again. Still have it til this day.

  • @BrokenMotoHype
    @BrokenMotoHype Месяц назад

    hi,did you try shorting testpoints for bootloader unlocking and rooting?
    Nice video btw

  • @Steets
    @Steets 2 года назад +82

    Shoutout to all the open-source code that was used in breach of its license because this phone literally doesn't have a functional text viewer for the attributions.

    • @kanedaku
      @kanedaku 2 года назад

      That isnt correct.

    • @Oscar4u69
      @Oscar4u69 2 года назад +4

      who's gonna do something about it? nobody is going to enforce that

    • @DorperSystems
      @DorperSystems 2 года назад

      AOSP is Apache 2.0

    • @ryanjay6241
      @ryanjay6241 Год назад

      @@Oscar4u69 tell the FBI to enforce it

  • @dika2saja
    @dika2saja 2 года назад +189

    I like how this Anom phone is closed source software create false sense of security & privacy by making apps harder to access. The criminal clearly have no idea about software in general. Only Open-source can be trusted.

    • @Ignotus.
      @Ignotus. 2 года назад +20

      Also helped that the police around the world targeted the "techies" in the environments and got them to suggest it to their colleagues in return for a deal
      Don't remember exactly how if was, but something like that

    • @meyers0781
      @meyers0781 2 года назад +1

      "open source can be trusted"
      Brandon Nozaki Miller said hi.

    • @UmiZoomR
      @UmiZoomR Год назад

      They wont spy on you for watching porn budd. This phone was specifically made to catch criminals

    • @meercreate
      @meercreate Год назад +1

      Watch out for "bug doors" in open source stuff either put there intentionally or just exploited by someone who stumbled across a bug that allowed them to gain access

    • @cherrypepsi2815
      @cherrypepsi2815 Год назад

      @@UmiZoomR "it's OK! I'm only watching you while you sleep to make sure you're safe!"

  • @Sir_Pickle
    @Sir_Pickle Год назад +55

    Funny how the FBI can do this. But when a company or entity falsely claims security but spies on users, they go to jail or are fined.

    • @asteroidrules
      @asteroidrules 11 месяцев назад +2

      And someone with a search warrant can enter a building without the owner's permission. Unsurprisingly a criminal investigative organization has authority to investigate criminals.

    • @svampebob007
      @svampebob007 11 месяцев назад +1

      @@asteroidrules
      "Unsurprisingly a criminal investigative organization has authority to investigate criminals"
      Criminals around the world: wait what?

    • @bishouyabdel4185
      @bishouyabdel4185 10 месяцев назад +6

      @@asteroidrules key sentence, WITH A SEARCH WARRANT. It has to be with the bounds of law. This isint

    • @paritybit2277
      @paritybit2277 10 месяцев назад +3

      Pretty sure every ToS for all phones and software says "don't use it for illegal purposes", sorry kiddo but if you do crime and you get caught you're going to jail.

    • @realmadduck2464
      @realmadduck2464 10 месяцев назад

      "the investigation involving 9,000 law enforcement officers from 17 countries saw authorities monitor 27 million messages from 12,000 devices in 100 countries and track the activities of more than 300 organised crime groups, the European Union's law enforcement agency, Europol, said in a statement." ok 12k devices out but if we look at someone like apple which has over 1 billion active devices then is that fair? 12k is a lot smaller then 1 billion and the phone industries do not just give out a full on report about how they do things when they started it and how it works and ofc even the FBI cant just do this in different countires so even the countires were in it

  • @SethAurelius94
    @SethAurelius94 Год назад +2

    I mean all tech glows in the dark but this is fucking radiant.

  • @bluegizmo1983
    @bluegizmo1983 2 года назад +84

    I would love to see someone with an intact anom phone dump the APK for the messenger app that was removed on yours. It would be fun to decompile that app and see exactly how it worked.

    • @graywolf2694
      @graywolf2694 2 года назад +18

      Bet the alphabet agency's would not like that very much

    • @efraim.
      @efraim. 2 года назад +3

      Someone has to Reverse Engineer that shit

    • @zekiz774
      @zekiz774 2 года назад +4

      But how would you do this? You would have to desolder the emmc

    • @densidste9137
      @densidste9137 2 года назад

      got to be a question of timing finding one that havnt been active edit: sense;since the FEDS was scouting users.

    • @jamesc5751
      @jamesc5751 Год назад

      @Efraim reverse engineer a messaging app with less features than any of the currently open source messaging apps that already exist?

  • @kbhasi
    @kbhasi 2 года назад +150

    I remember watching the Channel 9 news report of the Australian side of the operation. The 'anonymous' chat appeared to relay messages into a modified XMPP client.
    (0:44) I imagine all of the ones that were sold were based on the US market models.
    (6:20) I recognise that as a brain-dead version of the LineageOS/AOSP text messaging app, but with the icon of the Google version.
    I also suspect that there may be a hidden method to enter Android developer options, and/or the option to unlock the bootloader might even be enabled. I doubt the official Pixel Repair Tool would work.

  • @omarh789
    @omarh789 7 месяцев назад +1

    Remember that super secure phone OS called arcane os.. you know that one that was actually created by the FBI as an operation?

  • @BroPiss_og
    @BroPiss_og Год назад +1

    Wait until the fbi sees my browse history

  • @aidancrunk
    @aidancrunk 2 года назад +44

    Sounds like a huge invasion of privacy without acknowledgment lawsuit

    • @alyoshapearce5985
      @alyoshapearce5985 2 года назад

      Privacy is an illusion. It's not that they don't know. It's whether they have the resources to act upon the intelligence they have. Without criminals there is no budgets for law inforsment. A lot of crime could be eliminated by offering better educational opportunities. And creating national industrys. But it's cheaper to just make larger law inforsment agencies. That's what the public think we need. So its cheap political points for politicians. Proper Social Welfare Drug rehabilitation. And higher levels of employment. Can all radically reduce crime. But it doesn't win votes. People what instant results. More police wins conservative votes. Social reform can take generations before the results really start to show.

    • @GregMoress
      @GregMoress Год назад +1

      CCP doesn't care about privacy.
      "But my country isn't the CCP"
      Well, they don't admit it... but they are.

    • @WorksOnMyComputer
      @WorksOnMyComputer Год назад

      I'm sure the AFP and FBI put some thought into that issue.

  • @edbotwinik7185
    @edbotwinik7185 2 года назад +76

    Security and privacy can be verified by using open source projects.. no restrictions.. but this phone went the total opposite direction. Anyone with any bit of technical knowledge should have immediately seen all of that as a bunch of huge red flags.

    • @meyers0781
      @meyers0781 2 года назад

      npm said hi.

    • @alexanderSydneyOz
      @alexanderSydneyOz Год назад +9

      "Anyone with any bit of technical knowledge should have immediately seen all of that as a bunch of huge red flags."
      Interestingly, a story I read on the subject noted that some discussion forum post flagged that the phones were in 'constant contact with google servers and relaying messages to corporate servers in the 5 Eyes countries". Which this person knew because..... they had tested it!
      Note to self: if involved in running an international drug cartel and using a supposedly secure phone to openly talk about all that stuff, it might pay to have the phone tested by an expert to check the outgoing data streams!

    • @kishascape
      @kishascape Год назад

      well only morons who still use outdated drug dealing methods from movies in the 80s buy this nonsense. Just proves how mentally inept and what a bunch of useless desk jockies the FBI is.

    • @WorksOnMyComputer
      @WorksOnMyComputer Год назад

      You put a good argument forward that organised crime gangs, need a bigger and better IT department.

    • @Ben_the_Rosafan
      @Ben_the_Rosafan Месяц назад

      In general, criminals aren't exactly known for being the brightest bulbs in the shed.

  • @smokingone
    @smokingone Год назад +1

    You should pull the ROM off of it and inspect it. Probably have to pull it directly from the NAND chip, I doubt the phone has ADB or any custom bootloader accessible.

  • @Neckername1
    @Neckername1 Год назад +1

    Reminds me of Onion routing. Everyone thought it was amazing, safe, and anonymous. Unfortunately, they lack the ability to research the origins of things. If they did, they would have noticed they were using a tool developed by the US Naval Research Laboratory in tandem with various intelligence bodies. This was to protect the communications of operatives abroad.

  • @myrmeko
    @myrmeko 2 года назад +139

    First of all, the flash chip needs to pulled out of one of these and have it's files dumped manually, just for preservation purposes.
    Then, you could try using EDL mode, because that might just be able to bypass the secure boot, since it's a hardware feature you can't really remove.

    • @kanedaku
      @kanedaku 2 года назад +11

      Still would be missing the Anom messaging platform. A file dump should be done on a handset still containing the apk.

    • @myrmeko
      @myrmeko 2 года назад +9

      @@kanedaku Yeah... That's sad. But, at least, the OS modifications would be great to have. Especially the dual UI would be an amazing feature to implement in other ROMs.

    • @efraim.
      @efraim. 2 года назад +2

      What about full disk encryption?

    • @myrmeko
      @myrmeko 2 года назад +6

      @@efraim. Android had FDE before. But all clowns say that FBE is better than FDE. Yeah, because having apps that can access the decryption key AT BOOT without your explicit permission is really a lot better.
      Secure boot would also be a nice feature to have, but that needs to be implemented in the bootloader itself, unfortunately.

    • @smiths7317
      @smiths7317 2 года назад +6

      Dumping files is impossible as the flash contents are all encrypted, and EDL is one of the methods to flashing it.

  • @fatyoshi156
    @fatyoshi156 2 года назад +50

    There is a "disposable" tablet by amazon called the fire hd 8

    • @testosteroneinc.3800
      @testosteroneinc.3800 2 года назад

      😂👌

    • @fred-youtube
      @fred-youtube 2 года назад +1

      Thats still way better than the Anom Pixel

    • @kbhasi
      @kbhasi 2 года назад

      It's reminding me of US prepaid phones that some people just use as 'burner' phones because they're often cheap low-end phones

    • @fatyoshi156
      @fatyoshi156 2 года назад

      i mean unrepairable

  • @EdKolis
    @EdKolis 10 месяцев назад +2

    This is the only kind of phone you can buy when you're in hell.

  • @lu_501
    @lu_501 Год назад +3

    me casually with that phone without being a criminal: **roots the phone, then installs a custom OS**

  • @kezzyhko
    @kezzyhko 2 года назад +95

    They could modify the hardware to collect hardware-encrypted stuff like fingerprints

    • @TheGodOfAllThatWas
      @TheGodOfAllThatWas 2 года назад +10

      @weinerschnitzelboy Sure, but I think kezyhko's point is there is a reason for them to make hardware modifications. The video mentions there was no reason to modify the hardware, but If they modified the fingerprint scanner they could make it save a scan AND do the normal thing the OS is expecting. Or even just rewrite it so it doesn't do everything the normal way and does save the fingerprints. Did they, or would they? I doubt it, it probably adds too much complexity. Considering how they locked out pretty much everything they probably tried to keep it as mission focused as possible to stop any kind of errors from getting in the way, and making all those changes would probably be more error prone then it's worth.

    • @achilleaustin4477
      @achilleaustin4477 2 года назад +6

      @weinerschnitzelboy that’s why he’s suggesting hardware modifications to a sensor that does store readable data from the fingerprint

    • @kezzyhko
      @kezzyhko 2 года назад +8

      @weinerschnitzelboy Fingerprints aren't stored as images - in normal conditions. But if you can modify hardware - theoretically you can just silently send a fingerprint copy to OS. Idk how hard would it be to pull that off though

    • @WaltuhD
      @WaltuhD 2 года назад +3

      @weinerschnitzelboy it's the FBI after all so I'm pretty sure they could do it

    • @YISTECH
      @YISTECH 2 года назад +1

      @@WaltuhD you’d need to completely revamp the biometric reader from the ground up for that

  • @ChimeraX0401
    @ChimeraX0401 2 года назад +93

    Not being able to unlock it and install custom Rom or reinstall the original pixel 4a image kinda makes this phone now as good as a paper weight. FBI should at least unlock the bootloader prior to the end of their sting operation. Well at least people can still use it as a source so genuine pixel 4a parts....

    • @HughJeffreys
      @HughJeffreys  2 года назад +65

      I guess its so people cannot find out how the phone was developed. Yes it is a waste of good phones now that the app has been shut down.

    • @yxles
      @yxles 2 года назад +16

      I'm pretty sure that these phones shouldn't be able to come in our hands and use it since they only have a specific users which are the criminals so it make sense for FBI to strengthen the security of the phone (but create a backdoors that only them knows)

    • @umgak_prime
      @umgak_prime 2 года назад +14

      Went back and looked, it's in yellow boot, not orange boot. The bootloader is locked. Oof.
      Best bet is see if you can get a hold of MSM Tool or whatever it is Google uses for EDL. OnePlus usually "leaks" it shortly after launch and it's really handy to unbrick.
      Unless you can manually adb sideload the full system zip? It's signed with Google keys so it should hopefully take, although then you'll just be the proud owner of a Pixel 4a.

    • @yxles
      @yxles 2 года назад +1

      Wondering if other models can be unlock especially the Xiaomi one since their phone was very open and easy to unlock

    • @danteerskine7678
      @danteerskine7678 2 года назад +4

      @@HughJeffreys true indeed. That's a complete lemon, you can't even use the mp3 player, so what's the use of keeping that paperweight???
      I've seen Android Go phones which were horrible to use due to their miserly 1 GB RAM but at least, they do work as they should

  • @SirzechsZen
    @SirzechsZen Год назад +1

    You may be able to dump all the partitions and explore inside if you got some advanced knowledge
    Or even restore the phone to factory OS

  • @SteveAcomb
    @SteveAcomb Год назад +16

    honestly this shits really cool
    SO clever for them to pretend to “seize” the website when they canceled the program! Really adds verisimilitude, mad respect

  • @herbalterrorist420
    @herbalterrorist420 2 года назад +29

    We had something similar to this in the uk. Don’t know if it was the exact same thing but the idea was the same. It was meant to be encrypted and safe to any “business” so got quit popular with mid level drug dealers etc etc. The phone apparently cost a good grand or 2 afaik. It was a really simple device that would only do txt and calls through one app or something and you couldn’t do much if anything else at all a normal phone can do. Literally jus set up for msgs and calls via a pre installed all afaik. But the whole lot was a honeypot set up by the metropolitan (I think it was met.) police from the very start.
    We also had encrochat which had its encryption cracked in 2020 which led to over 700 arrests from people using the device thinking it was safe. I’m unsure if the 2 are the same event/bust and device or if there’s 2 different devices but I think it was 2 different devices/busts. I’m sure one was specifically set up to be a honey pot from the start but encrochat just had its encryption cracked apparently. It’s hard to find stuff online about it now tho.
    Edit; after watching the full video I’m gonna assume the fbi honey pot device “arcane” or woteva it’s called etc was the same device the uk police used just tailored and changed a bit for the uk etc. Cos it seems to be the exact same kinda thing.

    • @zekiz774
      @zekiz774 2 года назад

      No. Encrochat was real. It just was seized by Europol. They then infiltrated the servers and pushed an update that decrypts everything.
      Also It didn't just got popular with mid level drug dealers. It also was used by Hitman and in drug laboratories.
      It also wasn't just the UK. It was used all over Europe.

    • @K40005
      @K40005 Год назад

      Yeah it seems to be a slightly different version of the exact same software with a different name and obviously different hardware (from my very hazy memory)

  • @iloveplasticbottles
    @iloveplasticbottles 2 года назад +20

    Now technically speaking this is officially the world's first government smartphone.

    • @Pandahhhhhhhh
      @Pandahhhhhhhh Год назад +2

      You haven't met the north Korean android phone. It's so advance it has a anti fly app

    • @Somanybot
      @Somanybot 11 месяцев назад

      ​@@Pandahhhhhhhhred star os "anti virus"

  • @winconfig
    @winconfig 4 месяца назад

    Most people don't realize that mot encryption schemes had their development guided by the usual government agencies. This means that most encryption has known exploits when applying the correct techniques. This also applies to open source implementations of encryption ,but to a lesser degree.

  • @ShihammeDarc
    @ShihammeDarc Год назад +2

    I hate the government with every fibre of my existence.

  • @electrified0
    @electrified0 Год назад +9

    Whenever a company advertises themselves as being privacy focused and their source is "trust us", you should be skeptical of their true incentives since those are effective marketing words without any legally established definition.

    • @wilh3lmmusic
      @wilh3lmmusic 11 месяцев назад +2

      If they claim to be privacy focused then LOOK AT THE SOURCE CODE
      If it's proprietary: 🚩🚩🚩🚩

  • @user-wd6sg7wd8e
    @user-wd6sg7wd8e 2 года назад +75

    2:07 3:00 I'm Russian, and right now, every cop on the street expects himself to have a right to just seize your phone and look through photos. In Belarus, it is even worse. I need this function. I need this function a year ago.
    Seizing phones, cameras, notebooks "for questioning", and returning them a year later, - is a common practice with our police.

    • @ILNSuryaChandra
      @ILNSuryaChandra 2 года назад +4

      Miui has this function

    • @abel55574
      @abel55574 2 года назад +4

      @@ILNSuryaChandra and 3000 ads in their own software aswell..

    • @ILNSuryaChandra
      @ILNSuryaChandra 2 года назад +3

      @@abel55574 you can use EU version of if you like. Don't count number of ads from next time. It's waste of time 🙂

    • @Astro_War
      @Astro_War 2 года назад +7

      I'm English and live in UK and here its not so different regarding seizures. My devices were seized by UK Police for 7 months before being returned. They found nothing even with forensic analysis. Only dumb phone like an old Nokia can be trusted and actually was the only device they didn't seize. Regarding notebooks ensure they use SSD drives and schedule trim function frequently.

    • @Sharpless2
      @Sharpless2 2 года назад

      @@abel55574 uh... No? I have never seen a single ad in any Xiaomi app. And in the apps that CAN show ads, you can literally disable them with a blue slider.
      If you never used a Xiaomi device, Shut the hell up.

  • @maxjoestar3280
    @maxjoestar3280 Год назад

    Damn that is some good use of a device right there Hope the FBI wont show up to take that phone away from you.

  • @cameronscott1853
    @cameronscott1853 Год назад

    Thanks for letting me know

  • @jasonls221
    @jasonls221 2 года назад +50

    You could probably get root with an exploit since it's outdated and there has been a few root exploits in the recent years, might need a browser/webview, filemanager, or terminal/shell as a minimum though, I'd love to mess around with something like that

    • @robertplayz9157
      @robertplayz9157 2 года назад +4

      That's why there is no browser app, not even in decoy mode

    • @jasonls221
      @jasonls221 2 года назад +4

      Yeah but there's always something overlooked or newly discovered, that's the excitement of it

    • @thomasandrews9355
      @thomasandrews9355 2 года назад

      I'm sure the fbi has top men on it

    • @jasonls221
      @jasonls221 2 года назад +2

      That changes nothing

    • @efraim.
      @efraim. 2 года назад +1

      @@jasonls221 +1

  • @potatosordfighter666
    @potatosordfighter666 2 года назад +10

    I have a Xiaomi Mi 9T, which has an actual "2 phone" thing called second space, where you can load into different images, almost like different accounts, which are two completely separate phones basically. Different apps, home screen, setup, etc. You can have it load into either from different fingerprints, patterns, or different faces.

    • @ahsokaincognito
      @ahsokaincognito Год назад

      Xiaomi makes a tracking request in the background almost every minute last time I checked and also had an incognito mode tracking scandal a few years back

  • @jimygerilius2377
    @jimygerilius2377 Год назад

    interesting phone. I have never seen where the keypad is scrambled @2:07 when inputting a code. Is this only available on this phone or something new? I imagine it's a great feature if you suspect someone is watching over ones shoulder and memorizing a pattern, but then changes the next time prompting of your PIN.

    • @bradleystone9191
      @bradleystone9191 Год назад

      Yeah, its a feature that is on some custom roms. The first (and only) time I was introduced to it was grapheneOS (totally de-googled android, but you can re-google it within the "Apps" app) I still use it daily as the performance is way better and I can control what google apps have permissions to, including network.

  • @___DRIP___
    @___DRIP___ Год назад

    I love how many people are in the comments claiming they would have known straight away. It’s extremely easy to say that now.

  • @incredulousnneowow
    @incredulousnneowow Год назад +66

    Seems pretty illegal for the government to do this. Prolly should jail them all

    • @acewmd.
      @acewmd. Год назад +20

      Don't worry I'm sure the FBI can handle the investigation, after all it is themselves, they're looking into so there's no way they can fail.

    • @kennygee2715
      @kennygee2715 Год назад +12

      We should give this phone to all the politicians and law enforcement and see what THEY"RE up to. Haha. The laws are only for us plebs to follow. The politicians and law enforcement are above the law.

    • @rbr1170
      @rbr1170 Год назад +6

      FBI wants to know you location.
      Sorry, they already do.

    • @bacon6899
      @bacon6899 Год назад +3

      Uhh. It's legal. So long as you are deemed a threat to National Security, the NSA, CIA, FBI, and whoever else can legally watch your every move.
      In this particular case, the phones were owned and technically leased by the company who made them, which means that the phone creator legally had the right to authorize whoever they wanted to their phones, in this situation it just happened to be the FBI.

    • @coreysmalls4259
      @coreysmalls4259 Год назад +1

      The ppl asked for that "Patriot act"

  • @dazgodbold
    @dazgodbold 2 года назад +190

    Locked bootloader, missing location settings and the messaging app installing remotely are huge red flags. Who fell for this?

    • @sabersz
      @sabersz 2 года назад +69

      Criminals are stupid, most of the time. I could believe that a few fell for this

    • @robertplayz9157
      @robertplayz9157 2 года назад +2

      They couldn't know before they powered it on

    • @Steets
      @Steets 2 года назад +47

      I mean, for somebody who just purchased an "ultra-private" phone, it wouldn't be hard to jump to the conclusion of "Well the location settings are removed because all GPS/location functionality is removed from the device". That said, the inability to install other apps is a massive problem.

    • @kanedaku
      @kanedaku 2 года назад +10

      @@Steets It was only for clandestine communications. We kept normal phones on us at the same time.

    • @fryphillipj560
      @fryphillipj560 2 года назад +3

      Are you sad about that? I WISH there where much more projects like that and less, much less, general surveilance.

  • @WvlfDarkfire
    @WvlfDarkfire 9 месяцев назад

    I remember hearing about these, but always suspected something was too good to be true

  • @Osahashi
    @Osahashi Год назад +11

    Very interesting video. The idea with the honeypot is ingenious, and I hope they could make the world a little safer with it. One thing bothers me a lot though, not everyone who buys such a device with such an OS is a criminal, many people just want more privacy and security. As an end user, do I practically always have to assume that such devices are honeypots? What happened to the data of consumers who were not criminals? In our time, after so many scandals, it is not wrong to look for more security.

    • @dilligaf8349
      @dilligaf8349 9 месяцев назад +2

      Not really. Just shows that there is very little respect of laws by the ones that enforce them. How many cops ended up with one of these phones? Big gangs have tech experts in this day and age. So who did they really catch.

    • @crazyabe4571
      @crazyabe4571 4 месяца назад +1

      @@dilligaf8349 A mixture of people who weren't smart enough to spot the trap, and a whole lotta Australians who were violating their nanny state's guidelines.

  • @junzenlavapie4458
    @junzenlavapie4458 2 года назад +104

    9:51
    "There is plenty of reasons to want more privacy and security. Especially with most companies tracking you..."
    I was almost certain you were about to divert into "that's why I use NordVPN..." 😂

    • @Sharpless2
      @Sharpless2 2 года назад +3

      that wouldve been a LinusTechTips level of butter smooth sponsorship segway.

    • @spunkysamuel
      @spunkysamuel 2 года назад +4

      @@Sharpless2 It's pretty unoriginal nowadays though

    • @your_average_cultured_dude
      @your_average_cultured_dude Год назад

      nordvpn isn't open source so you can never know what they actually do with your data. It's only secure if you don't want your ISP to know what you're doing.The feds can still demand all of the data that nordvpn has on their users

    • @Sharpless2
      @Sharpless2 Год назад

      @@your_average_cultured_dude Your Toothpaste isnt opensource either. They could literally be putting in Microdoses of cocaine to make sure youre always coming back to the same brand.
      Oh and if the Government wants something, they WILL get it no matter what.

    • @Rekkuza-eu6sp
      @Rekkuza-eu6sp Год назад

      This world is rapidly passing away and I hope that you repent and take time to change before all out disaster occurs! Belief in messiah alone is not enough to grant you salvation - Matthew 7:21-23, John 3:3, John 3:36 (ESV is the best translation for John 3:36) if you believed in Messiah you would be following His commands as best as you could. If you are not a follower of Messiah I would highly recommend becoming one. Call on the name of Jesus and pray for Him to intervene in your life - Revelation 3:20.
      Contemplate how the Roman Empire fulfilled the role of the beast from the sea in Revelation 13 over the course of 1260+ years. Revelation 17 confirms that the beast is in fact Rome. From this we can conclude that A) Jesus is the Son of God and can predict the future or make it happen, B) The world leaders/nations/governments etc have been conspiring together for the last 3000+ years going back to Babylon and before, C) History as we know it is fake. You don't really need to speculate once you start a relationship with God.
      Can't get a response from God? Fasting can help increase your perception and prayer can help initiate events. God will ignore you if your prayer does not align with His purpose (James 4:3) or if you are approaching Him when "unclean" (Isaiah 1:15, Isaiah 59:2, Micah 3:4). Stop eating food sacrificed to idols (McDonald's, Wendy's etc) stop glorifying yourself on social media or making other images of yourself (Second Commandment), stop gossiping about other people, stop watching obscene content etc. Have a blessed day!

  • @adamo1139
    @adamo1139 2 года назад +101

    How the hell is that legal? This just screams government overreach.

    • @Zendarkos
      @Zendarkos 2 года назад +30

      Everything can be made legal if you have a good reason. And a whole lot of money, which the government obviously owns.

    • @Oscar4u69
      @Oscar4u69 2 года назад +8

      what's your reasoning for it being illegal?

    • @xkeepersvk
      @xkeepersvk 2 года назад +30

      @@Oscar4u69 personal privacy? presumption of inocence?

    • @Dhruv-qw7jf
      @Dhruv-qw7jf 2 года назад +37

      @@Oscar4u69 some normal "non-criminal" people must have bought it in the time period it was available (probably tens of thousands, if not hundreds of thousands). The invasive privacy measures in this phone meant all of their data and personal messages were being sent to the FBI and the government as well.

    • @Capt-Intrepid
      @Capt-Intrepid 2 года назад +15

      They aren't legal in the USA without a warrant issued by a court pursuant to the Fourth Amendment.

  • @yodrewyt
    @yodrewyt Год назад

    This is the story of virtually every piece of mass-marketed technology.

  • @Maxim.Teleguz
    @Maxim.Teleguz 7 месяцев назад

    If I could take a look at it I would probably be able to get through it. And so many other people would too. Is there a way to do a 1 for 1 copy of the whole os or at least do a backup of it and share it with us?

  • @wucash5672
    @wucash5672 Год назад +20

    Is nobody going to talk about how much of a violation this was of any one innocent / privacy minded rights who brought this phone? What court signed off on this? Literally NSA tier scandal. The FBI should be sued.

    • @lolololo-cx4dp
      @lolololo-cx4dp Год назад

      Literally every big tech doing the same thing. Kinda

    • @obsydian806
      @obsydian806 Год назад +5

      Well, he mentioned they caught criminals in Australia. This was a collaboration between the FBI and Aussies for an operation in Australia. So maybe laws are different there.

    • @wucash5672
      @wucash5672 Год назад

      @Mumen Rider Oh get screwed and from your perceptive the NSA spying on everyone and so called "personal privvages" to spouses was keeping thw world safer. Hope you radioactive deep state family members get knocked off in duty :) You seem to think peoples rights stop where sussposed "future" crime begins how your failing american state going Mr glowie hahahaah death to feds.

    • @brokenpotato438
      @brokenpotato438 Год назад

      @@obsydian806 It only got criminals in Australia and Europe charged, according to another comment. Criminals in America didnt get charged because of privacy laws

  • @alexandreb.1101
    @alexandreb.1101 2 года назад +64

    "the most locked down phone I've ever owned"
    Apple: WRITE THAT DOWN, WRITE THAT DOWN!

    • @shaggytewsak
      @shaggytewsak 2 года назад +4

      Rather have a normal truly optimised iphone than the most decked out android ever

    • @ok0_0
      @ok0_0 2 года назад +1

      @@shaggytewsak Android runs smoother nowadays imho. What type of old android phones do you use?

    • @justinwatson1510
      @justinwatson1510 2 года назад +1

      I’d rather use a Linux phone with barely-functioning hardware than let Google or Apple turn me into a revenue stream with a device I paid for. But hey, at least the Apple App Store has the most secure spyware on the market.

  • @zignitz
    @zignitz 11 месяцев назад

    Would be cool to see an actual hardware and software hacker have a go at one. Cool stuff.

    • @parodylover999
      @parodylover999 6 месяцев назад

      i'm sure it would require the "wire-to-the-board" exploit

  • @HappyHands.
    @HappyHands. Год назад +1

    Recently purchased new a Samsung A03s phone. its a amazing phone for the price... which makes me a tad suspicious. However there is a ton of stuff running in the background that i can't turn off. and those apps and services are simply described by Samsung as "Other" which is a bit disconcerting and they are literally taking up HALF of the phones memory and storage.

  • @hristosmourselas3939
    @hristosmourselas3939 2 года назад +51

    Just imagine the same thing but no backdoors. It would be a very cool phone

    • @mr.sexyman123
      @mr.sexyman123 2 года назад +15

      might i recommend grapheneOS? same idea except its not a fbi honeypot

    • @mohamedbouziani2467
      @mohamedbouziani2467 2 года назад

      @@mr.sexyman123 i was looking for a graphene OS comment

    • @hristosmourselas3939
      @hristosmourselas3939 2 года назад

      @@mr.sexyman123 i'll have a look

    • @ghost-user559
      @ghost-user559 2 года назад

      @@mr.sexyman123 You sure?
      The trick is they don’t care what os or model, if the SIMs are all compromised.

    • @kanedaku
      @kanedaku 2 года назад

      @@mr.sexyman123 *Found the undercover, everybody!!!*

  • @lemonadesnake
    @lemonadesnake 2 года назад +4

    4:00 you can use an app called “Activity Launcher” to find hidden activities (menus) in the settings

  • @DeShonFaNaKa
    @DeShonFaNaKa 10 месяцев назад +23

    Point of the story: NEVER use phones while committing crimes.

  • @michaelmalicki1577
    @michaelmalicki1577 2 месяца назад

    Can you change the logic board of the ANOM phone with a logic board from a stock google pixel phone?