spv.sh

  • 6 Posts
  • 83 Comments
Joined 3 months ago
cake
Cake day: May 8th, 2025

help-circle





  • moi: “not talking about like NSO group RCEs 'n shit”

    tu: “how do you think pegasus works”

    you could have at least picked a different cyberwarfare company…

    by that logic, every OS under the sun has massive backdoors. bugs exist, man. my point was that for the average person, a fully-patched ithing is going to be among the more secure options.


  • spv.shAtoPrivacy@lemmy.ml[OC] What People Think Privacy/Security Is
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    4
    ·
    27 days ago

    the codebase itself? besides XNU, nobody… but, given the immense amount of scrutiny placed on the software, if there was some magic backdoor (an intentional one, anyway, not talking about like NSO group RCEs 'n shit), don’t you think we’d know?

    the average person doesn’t even know what grapheneos is. if they’re either going to buy an iphone, or some generic android phone running a vendor kernel that hasn’t been patched this administration, i’d want them to buy the iphone.














  • fellow u-console owner! i have the a-06. the modem is shite, in my experience. i can’t say for sure but i’d guess it’s arm. the pinephone (pro) uses the eg25-g (as i discuss in the article), which runs an android bootloader, older linux kernel, and generic gnu(?) userland. the bootloader, kernel, and userland are all FOSS (well, they can be flashed to be, anyway). the ADSP (the code that directly interfaces with the radios) is proprietary, for practical and regulatory reasons. this doesn’t really effect my threat model, as i assume that anything a sophisticated attacker could glean from an ADSP backdoor they could much more easily glean through the radio traffic itself. the TZ (arm trustzone) firmware is also proprietary, for technical reasons. iirc it’s signed by ARM, but this is just off the top of my head, so don’t quote me! or do, i’m not your dad…