Archived Link

A smartphone smuggled out of North Korea is offering a rare – and unsettling – glimpse into the extent of control Kim Jong Un’s regime exerts over its citizens, down to the very words they type. While the device appears outwardly similar to any modern smartphone, its software reveals a far more oppressive reality. The phone was featured in a BBC video, which showed it powering on with an animated North Korean flag waving across the screen. While the report did not specify the brand, the design and user interface closely resembled those of a Huawei or Honor device.

It’s unclear whether these companies officially sell phones in North Korea, but if they do, the devices are likely customized with state-approved software designed to restrict functionality and facilitate government surveillance.

One of the more revealing – and darkly amusing – features was the phone’s automatic censorship of words deemed problematic by the state. For instance, when users typed oppa, a South Korean term used to refer to an older brother or a boyfriend, the phone automatically replaced it with comrade. A warning would then appear, admonishing the user that oppa could only refer to an older sibling.

Typing “South Korea” would trigger another change. The phrase was automatically replaced with “puppet state,” reflecting the language used in official North Korean rhetoric.

Then came the more unsettling features. The phone silently captured a screenshot every five minutes, storing the images in a hidden folder that users couldn’t access. According to the BBC, authorities could later review these images to monitor the user’s activity.

The device was smuggled out of North Korea by Daily NK, a Seoul-based media outlet specializing in North Korean affairs. After examining the phone, the BBC confirmed that the censorship mechanisms were deeply embedded in its software. Experts say this technology is designed not only to control information but also to reinforce state messaging at the most personal level.

Smartphone usage has grown in North Korea in recent years, but access remains tightly controlled. Devices cannot connect to the global internet and are subject to intense government surveillance.

The regime has reportedly intensified efforts to eliminate South Korean cultural influence, which it views as subversive. So-called “youth crackdown squads” have been deployed to enforce these rules, frequently stopping young people on the streets to inspect their phones and review text messages for banned language.

Some North Korean escapees have shared that exposure to South Korean dramas or foreign radio broadcasts played a key role in their decision to flee the country. Despite the risks, outside media continues to be smuggled in – often via USB sticks and memory cards hidden in food shipments. Much of this effort is supported by foreign organizations.

  • Read Bio
    link
    fedilink
    English
    715 days ago

    I wonder if North Korea asks the phone manufacture to do the screenshotting things,etc or that the north korean goverment flashes roms

  • @[email protected]
    link
    fedilink
    English
    4116 days ago

    … How do you people think your stock mobile OS keyboard ‘learns’ how to better autocorrect to your manner of typing?

    Do ya’ll think that data is not available, for sale, to any business or agency that will pay for it?

  • billwashere
    link
    fedilink
    English
    915 days ago

    Stories like this likely give TACO Don a little mushroom chubbie.

  • @[email protected]
    link
    fedilink
    English
    8
    edit-2
    15 days ago

    A state that sees it’s citizens as a threat is broken by design and needs to be changed fixed. It goes against the very idea of a state.

    • @[email protected]
      link
      fedilink
      English
      215 days ago

      A state that sees it’s citizens as a threat is broken by design

      there are very few places in the world where this doesn’t apply

      and needs to be changed fixed

      by whom?

  • @[email protected]
    link
    fedilink
    English
    3215 days ago

    Probly happens in the US too but we won’t know until a whistleblower comes forward and gets a lifetime of solitary confinement for telling us

    • @[email protected]
      link
      fedilink
      English
      6
      edit-2
      14 days ago

      Yep. Just like with reverse-engineering software and making unintented use of proprietary services, whistleblowing depends at nobody being able to threaten you with jail or worse.

      Your country should have made it law when Watergate and such were still fresh in memory. To make such mechanisms not just “de facto”, but “de jure” reality. Because any “de facto” either becomes “de jure” or vanishes without a trace.

      EDIT: similar with “adversarial interop” CD was talking about

      EDIT2: or Gutenberg and the printing press and the conflicts to ensue…

    • That Weird Vegan
      link
      fedilink
      English
      5
      edit-2
      15 days ago

      didn’t google just announce android was gonna do the same thing?

      edit: it was microshaft.

    • @[email protected]
      link
      fedilink
      English
      1816 days ago

      The North Korean government’s totalitarianism predates Ninteen Eighty-Four. North Korea might have been an input for Nineteen Eighty-Four, mind…

      • Don Antonio Magino
        link
        fedilink
        English
        215 days ago

        The book does predate the North Korean utter totalitarianism. Nineteen Eighty-Four was published in 1949, the year after the Democratic People’s Republic was founded. It was based on the Stalinist Soviet Union and Nazi Germany.

  • 𞋴𝛂𝛋𝛆
    link
    fedilink
    English
    4716 days ago

    All mobile manufacturers could be doing this too. All of the SoCs are proprietary black boxes as are the modems.

    • Silicon
      link
      fedilink
      English
      715 days ago

      Let’s not forget sim cards are tiny computers as well.

      • 𞋴𝛂𝛋𝛆
        link
        fedilink
        English
        1215 days ago

        No hardware documentation whatsoever. We don’t know what registers and instructions exist at the lowest levels.

        As far as I am aware, there is no way to totally shut off and verify all cellular connections made, like to pass all traffic through a logged filter.

    • @[email protected]
      link
      fedilink
      English
      715 days ago

      That secret screenshot folder would eat up your storage quite fast, and it would be known, from whistleblowers, workers having to check the screenshots, “proof coming out from it” etc etc etc

      • 𞋴𝛂𝛋𝛆
        link
        fedilink
        English
        615 days ago

        There is certainly validity in the concept that no known instance of exploitation exists. However that is only anecdotal. The potential exists. Naïve trust in others has a terrible track record on these scales of ethics. Every instruction and register should be fully documented for every product sold.

        An adequate webp image is only a few tens of kilobytes. Most people now have a bridged connection between their home network and cellular, unless they go out of their way to block it. Periodic screenshots are rather crazy. It would be much easier to target specific keywords and patterns.

        • @[email protected]
          link
          fedilink
          English
          215 days ago

          Well are we putting people in prison with the help of them? A secret screenshot folder nobody can exploit isn’t very useful …

          Not saying it can’t be done (you are of course right there), we hand it over freely often, but that the implications are not death to your family.

          • @[email protected]
            link
            fedilink
            English
            3
            edit-2
            15 days ago

            You dont have to bring them to court with it for it to be useful. It could be used to target individuals then they use more conventional methods of evidence gathering to arrest.

            I would guess they arent currently doing it enmasse because that doesnt sound useful either. I would say, solely on a vibes based level its been done by US intelligence. Its really not so different than a wiretap.

        • kamen
          link
          fedilink
          English
          3
          edit-2
          15 days ago

          I’d be interested in how this documenting could be done. If you’re a manufacturer, you’d probably want to keep everything secret - except what’s needed for a patent for example - otherwise the competition might get an idea of the proprietary things you make in house.

          I mean I’m all for it, I just don’t see it happening unless under very strict regulations.