Thanks for the interesting debate. @de0u . I agree there is room for a more informed legal opionon on the legality of deleting data at a border checkpoint.
However, I think it is important to seperate the idea of sensitive from the context of legalilty. The concept of "sensitive" is in no small way a key part of many threat models that dont cross into illicit or illegal. For instancd, for journalists a simple contact will often qualify as sensitive. I think even in this climate it would be hard to say that a journalist deleting a contact or multiple conttacts from their device (in addition to using disappearing messages and coded contact names) would qualify as illegal. However, the ability to do so quickly would be vital to anyone reporting issues which may anger powerful state actors. Similarly, for a tax attorney, a clients fin info may qualify as sensitive. I dont think it is a big stretch to assume a lawyer may want to, and is legally allowed to delete their clients data if there is a risk it will be copied into a gov system.
Instead of parsing out these difference it maybe more useful to just assume that sensitive is anything you as the user dont want your adversary to see and that deleting it to keep it out of your adversaries hands is enough even if they have evidence that you have done so. And while evidence of that action maybe obvious to a trained expert having the ability to present a dummy profile to an agent you may assume is not technically sophisticated enough to see the signs could be useful to shorten some interactions with LEO
It is true @Onlyfun that a dummy profile may extend an interaction with a LEO agent during a border crossing, it does seem that this may be an acceptable risk if at the end of the encounter the agents are only able to collect the sanitized data set up on the phone. This may still be true if they can determine something else was there and deleted. Even in those circumstances where the user has to surrender their device the idea is that the sensitve data is out of reach. I am suggesting this as a tactic or layer in a layered strategy.
@Wadder this article has been making the rounds and there are lots of other good articles about the increased use of cellebrite and other tools across the us federal agencies
https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/
I am not trying to start a debate about the veracity or legality of these efforts. I am only suggesting that it is a reasonable threat scenario for users to want to approach these issues with a layered defensive model.
A dummy profile or shadow profile should be thought of as a layer of defense to be deployed when the user judges it can be successful in heloing them to achieve a specific goal during an interaction with law enforcement
All that said @de0u I agree with you it seems clear the GOS dev team does not appear to have an appetite for this type of function. My hope is that this may change as the call for this feature comes to be seen as less of an edge case and more central to a comprehensive layered strategy of defense against digital data capture and surveillance.