Profile 1: Owner
Passphrase: Strong Passphrase #1
Purpose: System control, App stores, installation of apps to secondary profiles
Behavior: No sensitive data, unlock only to install,verify and update apps
VPN: Connected with kill switch
Optional: VPN disconnected after updates to effectively make profile offline for manual updates
Profile 2: Main #1
Passphrase: Strong Passphrase #2 (different from Owner)
Purpose: Daily driver
Behavior: Active at home, End Session before leaving
VPN: Connected with kill switch
Optional: VPN Inclusive split tunnel app list to stop even time updates
Profile 3: Main #2 (optional)
Passphrase: Strong Passphrase #2 (same as Main #1, different from Owner)
Purpose: Google Play Services
Behavior: Active at home, End Session before leaving
VPN: Connected with kill switch
Optional: VPN Inclusive split tunnel app list to stop even time updates
Profile 4: Outdoor #1
Passphrase: Simple passphrase #3 (e.g., "000008")
Purpose: What you hand over if robbed/stopped
Apps: Maps, Camera, Gallery, not logged in messengers apps to say with (battery usage and network permission disabled)
Behavior: Active when outdoor
VPN: Connected with kill switch
Optional: VPN Inclusive split tunnel app list to stop even time updates
Profile 5: Outdoor #2
Passphrase: Strong Passphrase #2 (same as Main #1, Main #2, different from Owner)
Purpose: Messenger notifications - hidden behind passphrase
Behavior: Active in background while on Outdoor #1, notifications forwarded
VPN: Connected with kill switch
Optional: VPN Inclusive split tunnel app list to stop even time updates
Profiles 6-15: 10 Decoy profiles
Passphrase: Same as Outdoor #1 (e.g., "000008")
Purpose: Plausible deniability
Apps: Random
Behavior: Never used
DURESS
Passphrase: Unique from all others, simple to remember and triggered as soon as possible in brute–force scenario (e.g., "0011")
Effect: Irreversible factory reset, wipes all data and eSIM
4 PASSPHRASES TO REMEMBER
Owner: Unique Strong Passphrase #1
Main #1, Main #2, Outdoor #2: Strong Passphrase #2
Outdoor #1, Decoys #6-15: Simple "000008" Passphrase #3
Duress: Unique simple "0011" Passphrase #4 to trigger wipe of data and eSIM
WORTH MENTIONING
- Only Simple "000008" Passphrase #3 (Outdoor #1/Decoy #6–15) is safe to hand over
- Give Passphrase to Owner profile only in critical situation as it opens attack surface via USB/ADB
- Never give Strong Passphrase #2 (Main #1/Main #2/Outdoor #2), you have 10 Decoys/Outdoor #1 to say that you forgot Strong Passphrase #2 plausibly.
- End Session of Main #1, Main #2 profiles or reboot device to put them in BFU state and login Outdoor #2/Outdoor #1 before leaving home
- No need to enter Owner passphrase After First Unlock to switch user after ending secondary user session, just pull down control center and tap user switch icon in right bottom corner. (access user switch icon by pulling control center with two fingers in unlocked screen)
- Google Play Services with network permission in Owner and Main #2 profile can't communicate with Camera, Photos, Gboard, Translator in Main #1 via IPC (IPC scopes will mitigate it when arrived)
- Power button instantly locks
- Auto-reboot after 12/18 hours without successful unlock
- Think twice about fingerprint unlock
- Only use Duress Passphrase when there is no risk to life due to escalation when attacker will see device wipe
- Consider GOS device as lite client to your always updated data backup