Archived Link

A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un’s regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality. The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

It’s unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

One of the more revealing – and darkly amusing – features was the phone’s automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

Typing “South Korea” would trigger another change. The phrase was automatically replaced with “puppet state,” reflecting the language used in official North Korean rhetoric.

Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn’t access. According to the BBC, authorities could later review these images to monitor the user’s activity.

The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called “youth crackdown squads” have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

  • surph_ninja@lemmy.world
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    3
    ·
    3 days ago

    It’s funny, because it’s their government’s version of knockoff spyware, and decades out of date. Western governments get a live feed out of their backdoors.

    • gwilikers@lemmy.ml
      link
      fedilink
      English
      arrow-up
      11
      ·
      3 days ago

      Oh yeah, have there been reports on this ?

      (Not trying to shut you down, I’m genuinely curious)

      • surph_ninja@lemmy.world
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        3 days ago

        Yeah, there have been various leaks over the years that trickle out. Supposedly they’ve banned companies from operating in the US for refusal to comply with backdoor demands (Hawei, Kaspersky), some reports of backdoors built right into both Intel & AMD processors, some vague stuff that’s come out about backdoors in Windows, etc. Even when the companies refuse to comply, there’s been reports of US intelligence going into factories or intercepting deliveries to install spy chips into hardware. I recall there was a local ISP provider somewhere in the mid-west that got shut down for refusing to install spy devices in their facilities.

        Really a lot of this was confirmed as far back as Snowden. And plenty of whistleblowers and leaks since.

      • h6a@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        edit-2
        2 days ago

        There’s an extremely powerful backdoor in every processor/chipset. Intel named it “Management Engine” and AMD “Secure Technology”.

        From the Wikipedia page on Management Engine:

        The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller; one portion of the Ethernet traffic is diverted to the ME even before reaching the host’s operating system.

        ME has Serial over LAN, so it’s possible that attackers can have a more intimate access to your hardware than your Operating System.

        I imagine other manufacturers have similar frameworks.

        Full article.

        • jim3692@discuss.online
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 days ago

          Sure, those could theoretically be used for backdoor access to your computer.

          However, they are trivial to spot on most routers. If you see another device on the ethernet port that your computer connects to, then something weird is going on.

          Another important consideration is the fact that those technologies are meant for ethernet, while most people use laptops with wifi.