Why not some kind of partitioning software that boots up your phone into a give-away portion to be dumped if seized while hiding in some kind of very smart way a phones Graphene or other os partition?
Or, how about a secure chipset that doesn't use standard or known assembly language calls for bootup before transferring operations to a know OS. I know thats a long stretch, and I'm no programmer, but if a chipset uses calls that are unknown, and the OS is written in a way that only it knows those calls, is that a viable idea? I may be missing parts when saying this but I have always wondered about encryption of data on a device not running x86 calls but still using a standard character set. If that encrypted data (assume encrypted on a seperate hardware device) was retuned to a standard device how would anyone know how it was encrypted?
Just wondering...