So North Korea apparently has an android phone with basically a rootkit on it, that doesn’t allow you to open anything not signed by it on it, takes screenshots periodically and stuff.
Now assume you just wanna get around this, and have tools available, how do you do it?
Would you need to solder a new memory there? Could you try some sort of exploit first?
I think the solution will be a separate device. Even if you tampered with the one you’re given, you’re still running on their network. Even if you wanted to just chat over Bluetooth mesh with your fellow Winston Smiths, this doesn’t seem like a good idea.
In the border regions with China, some people who want to communicate with the real world, have phones that connect to the Chinese networks. A satellite able device would be better but probably too expensive.
A North Korean would probably smuggle one from China… I mean at least their malware is less invasive…
My thoughts go to flashing the OS. I only have experience with Pixel Devices flashed to Graphene, but options exist. From there, VPNs might be helpful.
But I’m not sure that’d be adequate, and it assumes you have access to gigabytes of internet connection already and (as pointed out by other commentors) probably wouldn’t get around network issues.
Ultimately, getting an outside device with satellite connection is an easier route.
VPNs wouldn’t do shit, I think their cellular data is air gapped. only high officials can access the outside internet
This is good to know.
Is that to say they run copy cat versions of major services on a national intranet (so as to make it appear comparable to the real internet)?
if you watch closely, they rip logos from big western companies to use as their app icons on their custom Android ROM
I suspect they don’t mask the fact the net is air gapped. So $randomWesternService is simply not available.



