Coming from a district court, I think this ruling could be appealed, but it’s welcome news nevertheless.

  • @xmunk@sh.itjust.works
    link
    fedilink
    96
    edit-2
    4 months ago

    It’s still an excellent idea to power off your phone whenever you are in the vicinity of a border guard and never voluntarily unlock it anywhere close to the border. You can’t (generally) be compelled to unlock your phone but you absolutely can have an unlocked phone grabbed out of your hands by a border guard with no legal right to lock it.

    • @leds@feddit.dk
      link
      fedilink
      514 months ago

      never voluntarily unlock it anywhere close to the border.

      Isn’t that defined as 100 mile from the border (including international airports)

      • @doingthestuff@lemmy.world
        link
        fedilink
        294 months ago

        I believe it’s 100 miles from the border including coastlines but does not include a 100 mile radius around international airports. I don’t remember the source but Ive seen a map that represented it that way.

        Also worth noting, this ruling only benefits citizens in that specific district, as other districts aren’t bound by its rulings. Personally I’d recommend having a 2nd device you can use to record your interactions because if they violate your rights your chances of getting their body cam video of it aren’t great.

        • Skeezix
          link
          fedilink
          134 months ago

          What if you’re 99 miles and 5279 feet from the border while being questioned? Can you take one more step and be safe?

          And are those statute miles or nautical miles?

          • It would depend on where they initiated contact. For instance, let’s say a cop from City A pulls someone over on the boundary with City B. Even if you pull over on City B’s side, it’s still a valid stop because they initiated it (turned their lights on) while still within their own legal jurisdiction. Even though you’re outside of their jurisdiction at the moment, what matters is that they first initiated contact when it was legal to do so.

      • sparky@lemmy.federate.cc
        link
        fedilink
        19
        edit-2
        4 months ago

        100 miles from the border or coastline is like 90% of the population of the country. And I assume that’s a feature, not a bug.

        • @frezik@midwest.social
          link
          fedilink
          94 months ago

          To add, the Great Lakes count as coastline because you can navigate to an international boarder from any of them. That’s how you cover the vast majority of the US population with this loophole.

    • @bdonvr@thelemmy.club
      link
      fedilink
      334 months ago

      This is important - power OFF your phone. Your phone is more secure before you unlock it for the first time after booting. Use a strong password as well.

      • @halcyoncmdr@lemmy.world
        link
        fedilink
        English
        16
        edit-2
        4 months ago

        You can also force your device into Lockdown mode, which does the same thing, without needing to shut it down or restart it. It’s easy to do quickly once you know how.

        On Android it’s enabled by default, you just hold the power button and press Lockdown.

        https://www.lifewire.com/use-android-lockdown-mode-6287933

        Iphones have a way to disable biometrics as well with a button combo, but its more a side effect of activating Emergency SOS, not a dedicated feature and how you activate it varies depending on your device model.

        https://thenextweb.com/news/how-to-quickly-disable-biometrics-iphone

        • @bdonvr@thelemmy.club
          link
          fedilink
          12
          edit-2
          4 months ago

          Lockdown mode is NOT the same. This disables biometrics, notifications, etc. But what FULLY rebooting does is protect against more sophisticated attacks like those of Cellebrite which is a company that sells devices to law enforcement that break into phones. I know border crossings often have access to a device of this type.

          Your device is encrypted pretty strongly, and before you put in your password for the first time after boot your data is essentially useless. But after that first time your device keeps the decryption key in memory so that it can be useful even while locked, serving you app notifications and processing in the background. This leaves your device open to many more exploits that could get around your lockscreen and into your unencrypted data. Leaked documents show that Cellebrite can very often get into devices after first unlock, but in the “before first unlock” state they can often only use brute force which you can protect against by having a cryptographically secure password.

          Looking at lockdown mode it’s pretty clear that it isn’t resetting to the more secure “before first unlock” state because it unlocks instantly with your password whereas after first boot there’s a small pause.

        • @catloaf@lemm.ee
          link
          fedilink
          English
          64 months ago

          I don’t think the lockdown mode is the same. It looks like it just disables biometric unlocking. I just tried, and it was far too quick to unlock, so it must keep the encrypted partition unlocked.