A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un’s regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality. The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.
It’s unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.
One of the more revealing – and darkly amusing – features was the phone’s automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.
Typing “South Korea” would trigger another change. The phrase was automatically replaced with “puppet state,” reflecting the language used in official North Korean rhetoric.
Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn’t access. According to the BBC, authorities could later review these images to monitor the user’s activity.
The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.
Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.
The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called “youth crackdown squads” have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.
Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.
All mobile manufacturers could be doing this too. All of the SoCs are proprietary black boxes as are the modems.
laughs in PinePho–
Sorry, my battery died as I was typing that
Let’s not forget sim cards are tiny computers as well.
That secret screenshot folder would eat up your storage quite fast, and it would be known, from whistleblowers, workers having to check the screenshots, “proof coming out from it” etc etc etc
https://en.m.wikipedia.org/wiki/Printer_tracking_dots
There is certainly validity in the concept that no known instance of exploitation exists. However that is only anecdotal. The potential exists. Naïve trust in others has a terrible track record on these scales of ethics. Every instruction and register should be fully documented for every product sold.
An adequate webp image is only a few tens of kilobytes. Most people now have a bridged connection between their home network and cellular, unless they go out of their way to block it. Periodic screenshots are rather crazy. It would be much easier to target specific keywords and patterns.
I’d be interested in how this documenting could be done. If you’re a manufacturer, you’d probably want to keep everything secret - except what’s needed for a patent for example - otherwise the competition might get an idea of the proprietary things you make in house.
I mean I’m all for it, I just don’t see it happening unless under very strict regulations.
Well are we putting people in prison with the help of them? A secret screenshot folder nobody can exploit isn’t very useful …
Not saying it can’t be done (you are of course right there), we hand it over freely often, but that the implications are not death to your family.
You dont have to bring them to court with it for it to be useful. It could be used to target individuals then they use more conventional methods of evidence gathering to arrest.
I would guess they arent currently doing it enmasse because that doesnt sound useful either. I would say, solely on a vibes based level its been done by US intelligence. Its really not so different than a wiretap.
I ve heard this a lot, how are modems black boxes?
No hardware documentation whatsoever. We don’t know what registers and instructions exist at the lowest levels.
As far as I am aware, there is no way to totally shut off and verify all cellular connections made, like to pass all traffic through a logged filter.