this post was submitted on 02 Jun 2025
834 points (96.5% liked)

Technology

70877 readers
3171 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Archived Link

A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un's regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality. The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

It's unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

One of the more revealing – and darkly amusing – features was the phone's automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

Typing "South Korea" would trigger another change. The phrase was automatically replaced with "puppet state," reflecting the language used in official North Korean rhetoric.

Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn't access. According to the BBC, authorities could later review these images to monitor the user's activity.

The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called "youth crackdown squads" have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

you are viewing a single comment's thread
view the rest of the comments
[–] j4k3@lemmy.world 42 points 3 days ago (3 children)

All mobile manufacturers could be doing this too. All of the SoCs are proprietary black boxes as are the modems.

[–] Valmond@lemmy.world 8 points 3 days ago (2 children)

That secret screenshot folder would eat up your storage quite fast, and it would be known, from whistleblowers, workers having to check the screenshots, "proof coming out from it" etc etc etc

[–] j4k3@lemmy.world 6 points 3 days ago (2 children)

There is certainly validity in the concept that no known instance of exploitation exists. However that is only anecdotal. The potential exists. Naïve trust in others has a terrible track record on these scales of ethics. Every instruction and register should be fully documented for every product sold.

An adequate webp image is only a few tens of kilobytes. Most people now have a bridged connection between their home network and cellular, unless they go out of their way to block it. Periodic screenshots are rather crazy. It would be much easier to target specific keywords and patterns.

[–] kamen@lemmy.world 3 points 3 days ago* (last edited 3 days ago)

I'd be interested in how this documenting could be done. If you're a manufacturer, you'd probably want to keep everything secret - except what's needed for a patent for example - otherwise the competition might get an idea of the proprietary things you make in house.

I mean I'm all for it, I just don't see it happening unless under very strict regulations.

[–] Valmond@lemmy.world 2 points 3 days ago (1 children)

Well are we putting people in prison with the help of them? A secret screenshot folder nobody can exploit isn't very useful ...

Not saying it can't be done (you are of course right there), we hand it over freely often, but that the implications are not death to your family.

[–] Clinicallydepressedpoochie@lemmy.world 3 points 3 days ago* (last edited 3 days ago)

You dont have to bring them to court with it for it to be useful. It could be used to target individuals then they use more conventional methods of evidence gathering to arrest.

I would guess they arent currently doing it enmasse because that doesnt sound useful either. I would say, solely on a vibes based level its been done by US intelligence. Its really not so different than a wiretap.

[–] plyth@feddit.org 5 points 3 days ago

Developed by Xerox and Canon in the mid-1980s, the existence of these tracking codes became public only in 2004.

https://en.m.wikipedia.org/wiki/Printer_tracking_dots

[–] silicon@lemmy.world 7 points 3 days ago

Let's not forget sim cards are tiny computers as well.

[–] thickertoofan@lemm.ee 2 points 3 days ago (1 children)

I ve heard this a lot, how are modems black boxes?

[–] j4k3@lemmy.world 11 points 3 days ago

No hardware documentation whatsoever. We don't know what registers and instructions exist at the lowest levels.

As far as I am aware, there is no way to totally shut off and verify all cellular connections made, like to pass all traffic through a logged filter.