Although lockdown mode is a good step and helps defend against biometric warrents, it does not wipe the encryption keys from RAM. This can only be achieved by using a secondary (non-default) user profile on GrapheneOS, and triggering the End session feature. This fully removes the cryptographic secrets from memory, and requires the PIN or password to unlock, which is enforced through the StrongBox and Weaver API of the Titan M2 secure element in Pixel devices.
Andromxda
You can use GrapheneOS, a security-focused version of Android which includes auto-reboot, timers that automatically turn off Wi-Fi and Bluetooth after you don't use them for a certain period of time, a duress PIN/Password that wipes all the data from your device after it's entered, as well as many other incredibly useful features.
It's fully hardened from the ground up, including the Linux kernel, C library, memory allocator, SELinux policies, default firewall rules, and other vital system components.
Calyx just copied the code from GrapheneOS, and I believe they still use the old GrapheneOS default of 72 hours
It's even worse nowadays, because we have good alternatives, unlike 20 years ago.
Where's Plume? It's better than WriteFrreely IMO
Everything PHP-related is for masochists
32MB was massive for documents at the time. It could hold your entire academic life back then.
Nowadays you need like 32 Gigabytes lol
Mullvad VPN offers Brave Search as a backend in their Leta search engine proxy. That way you don't have to access Brave directly.
Cellebrite is developed in Israel, a country that legally shouldn't even exist, and is known for genocide, crime, espionage, manipulation and propaganda, more war crimes, illegal settlements, using their intelligence agency to assassinate political opponents abroad, etc.
The so-called "only democracy in the middle east"