• paulpauper 7 hours ago

    Decoy phones could be a solution. You give the password to unlock a setting which appears to be the actual phone.

    • undefined 6 hours ago
      [deleted]