Archived Link

A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un’s regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality. The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

It’s unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

One of the more revealing – and darkly amusing – features was the phone’s automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

Typing “South Korea” would trigger another change. The phrase was automatically replaced with “puppet state,” reflecting the language used in official North Korean rhetoric.

Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn’t access. According to the BBC, authorities could later review these images to monitor the user’s activity.

The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called “youth crackdown squads” have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

  • outhouseperilous@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    2
    ·
    edit-2
    29 days ago

    Thats so dystopian, that it can only screenshot every five minutes. Thank god i use windows, and get over 60x the frames-on my double 4k monitor setup. So much better than those filthy north korean peasants. I hope someday they have this freedom.

  • Nangijala@feddit.dk
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    3
    ·
    edit-2
    1 month ago

    I’m glad I don’t live in North Korea because I wouldn’t want to traumatize their poor government with pics of my face and body in the morning. There are limits to cruelty.

    • ziggurat@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      30 days ago

      No that’s totally different… it will be used the same way but it takes much less manual work to perform

    • Venator@lemmy.nz
      link
      fedilink
      English
      arrow-up
      1
      ·
      28 days ago

      The main difference being the consequences that might result from the surveillance.

    • dan@upvote.au
      link
      fedilink
      English
      arrow-up
      50
      arrow-down
      1
      ·
      edit-2
      1 month ago

      I was going to say “that article mostly just seems to debunk the ‘my phone is always listening to me’ conspiracy theory” but then I got to the part about over 50% of analyzed Android apps having permission to take screenshots :/

        • dan@upvote.au
          link
          fedilink
          English
          arrow-up
          10
          ·
          1 month ago

          This is why my TV is on a separate VLAN (with no internet access) and I use an Nvidia Shield for streaming. I haven’t seen any indication that the Shield does anything like this.

          • EndlessNightmare@reddthat.com
            link
            fedilink
            English
            arrow-up
            6
            ·
            1 month ago

            Yeah, there is no reason for me to be connecting my TV to the internet. I use a HTPC which is much better for streaming than the TV’s built-in apps.

            • dan@upvote.au
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              1 month ago

              The one time I do connect the TV to the internet is when there’s a firmware update that fixes an issue I’m encountering. That’s rare though.

              I still have it on my network so I can control it using Home Assistant (eg have a backlight come on and dim the main lights when the TV is turned on) but it’s on an isolated VLAN.

      • WhyJiffie@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        38
        ·
        1 month ago

        Out of over 17,000 Android apps examined, more than 9,000 had potential permissions to take screenshots. And a number of apps were found to actively be doing so, taking screenshots and sending them to third-party sources.

        this is a weird paragraph. no permission is needed for an app to take screenshots of itself. all apps can do that.

        just an example: the Element matrix client has a bugreport feature that allows you to submit an automatically created screenshot of the previous menu.

        it seems there are several ways to accomplish this: https://stackoverflow.com/questions/2661536/how-to-programmatically-take-a-screenshot-on-android

        • dan@upvote.au
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 month ago

          Do those code snippets on the Stackoverflow post allow you to capture the entire screen regardless of which app is open, or do they only allow you to capture the app the code is running in?

          Capturing the app itself makes sense (for things like bug reports) but does Android really let any app capture whatever is on the screen?

          • WhyJiffie@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 month ago

            no, they only allow the app to capture its own screen content. to make a regular screenshot of the whole display, the app needs a permission that the user has to approve every single time, at least on most phones. that API is actually for continuous screen recording, but of course usable for this purpose too. this also means that after getting approved by the user, the app can keep its recording sessions to keep more screenshots, but that ends when the app gets killed by android. I think the system also shows a notification when an app is recording, but as anything that too could vary with phones.

  • m3t00🌎@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    30 days ago

    after the linux nerds opt out. there’s still 98% of the flock begging for ai surveillance from recall and whatever apple’s scam is lately.

  • surph_ninja@lemmy.world
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    3
    ·
    1 month ago

    It’s funny, because it’s their government’s version of knockoff spyware, and decades out of date. Western governments get a live feed out of their backdoors.

    • gwilikers@lemmy.ml
      link
      fedilink
      English
      arrow-up
      11
      ·
      1 month ago

      Oh yeah, have there been reports on this ?

      (Not trying to shut you down, I’m genuinely curious)

      • surph_ninja@lemmy.world
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        1 month ago

        Yeah, there have been various leaks over the years that trickle out. Supposedly they’ve banned companies from operating in the US for refusal to comply with backdoor demands (Hawei, Kaspersky), some reports of backdoors built right into both Intel & AMD processors, some vague stuff that’s come out about backdoors in Windows, etc. Even when the companies refuse to comply, there’s been reports of US intelligence going into factories or intercepting deliveries to install spy chips into hardware. I recall there was a local ISP provider somewhere in the mid-west that got shut down for refusing to install spy devices in their facilities.

        Really a lot of this was confirmed as far back as Snowden. And plenty of whistleblowers and leaks since.

      • h6a@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        edit-2
        30 days ago

        There’s an extremely powerful backdoor in every processor/chipset. Intel named it “Management Engine” and AMD “Secure Technology”.

        From the Wikipedia page on Management Engine:

        The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host’s operating system.

        ME has Serial over LAN, so it’s possible that attackers can have a more intimate access to your hardware than your Operating System.

        I imagine other manufacturers have similar frameworks.

        Full article.

        • jim3692@discuss.online
          link
          fedilink
          English
          arrow-up
          2
          ·
          30 days ago

          Sure, those could theoretically be used for backdoor access to your computer.

          However, they are trivial to spot on most routers. If you see another device on the ethernet port that your computer connects to, then something weird is going on.

          Another important consideration is the fact that those technologies are meant for ethernet, while most people use laptops with wifi.

    • monotremata@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      30 days ago

      Seriously. This is exactly what people object to about Windows Recall. In its re-released version at least it’s opt-in for now, but it’s still eerily close to this.