zwekihoyy

joined 2 years ago
[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

there is a difference between no verified boot and getting the this device is loading a different operating system message. for example, grapheneos has verified boot. anything other than stock will result in that splash screen though.

[–] [email protected] 2 points 1 year ago

I mean, losing message history is kinda a known drawback of e2ee. not that big of a deal

[–] [email protected] 1 points 1 year ago (1 children)

fission is functional with no noticeable issues on Firefox mobile as of like ~ff115/116. it just has to be manually enabled in about:config.

[–] [email protected] 3 points 1 year ago

well, your own server and every other server you've ever connected to.

[–] [email protected] 6 points 1 year ago (6 children)

out of curiosity, what do you use it for? I've never been able to find a useful function of it beyond a niche party trick

[–] [email protected] 23 points 1 year ago* (last edited 1 year ago) (1 children)

telemetry as a whole isn't bad. it depends what they are collecting. companies should provide a log of the (raw) telemetry data they've collected from you. if they're not comfortable sharing it it's probably too invasive.

[–] [email protected] -5 points 1 year ago

oh great. rooting, smh

[–] [email protected] -2 points 1 year ago (2 children)

there isn't really mitigating any hardware fingerprint. whatever you're using sounds like a bit of a scam lol.

[–] [email protected] 1 points 1 year ago

Mobile platforms like android and iOS (more specifically GrapheneOS), are leagues ahead of desktop operating systems in terms of security because of these strict policies. and besides, you are treating untrusted code as untrusted code. I don't see the flaw in that logic.

sure, they could use more apis for accessing system directories and stuff like that securely, but that's not really in scope. this is for end users. not field deployment on an sbc for something.

[–] [email protected] 2 points 1 year ago

that's fair I suppose, I wasn't saying not to use it, just that it is worth noting. these strict security policies are what makes mobile platforms much more secure than desktop platforms. I typically use my phone for security sensitive tasks because of this, so I tend to care a lot more about this stuff. if you have any banking info or password managers stored on the device, be careful.

I'll admit, it is pretty unlikely anything to happen, though. always just better knowing.

[–] [email protected] 9 points 1 year ago* (last edited 1 year ago)

this doesn't matter but I found it interesting bc of all the people recommending tools like shelter and insular, using profiles or work profiles to separate data would be siloing not sandboxing.

edit: with that said, as others have pointed out, apps are already sandboxed on Android. they can only really communicate with mutual consent ipc. so say for example, Google services can communicate with other Google apps because they both explicitly call for each other. while ipc is still technically something to think about, the mutual consent requirement makes it somewhat difficult to make malicious use of it.

apps aren't capable at accessing other app data whenever they wish, though. even with storage permissions granted it only really has access to user directories (downloads, documents, etc.).

edit2: additionally, it's worth noting that using any profiles (work or normal), will increase ram and battery usage by a decent margin as this will make a second user with all system apps running alongside your main user.

any solution involving root should also be considered a non-option as well, since gaining root access completely cripples androids security model.

view more: ‹ prev next ›