paulpauper 3 hours ago

Decoy phones could be a solution. You give the password to unlock a setting which appears to be the actual phone.