Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Fun Fact: My smartphone is turned off 95% of the time or so.

Fun Fact: My smartphone is turned off 95% of the time or so.

Scheduled Pinned Locked Moved Uncategorized
13 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • learntoliveprivate@privacysafe.socialL learntoliveprivate@privacysafe.social

    @lauren this is innaccurate you have vastly better permission models and security on up to date android and iphones then on desktops this is a missunderstanding of the security and permission models of mobile systems in fact your browser is even better off on your phone due to the permissions and restrictions the phone places on apps in fact your hardware identifier on most phones is blocked from apps on basically all current up to date phones including android since I beleive android 10.

    learntoliveprivate@privacysafe.socialL This user is from outside of this forum
    learntoliveprivate@privacysafe.socialL This user is from outside of this forum
    learntoliveprivate@privacysafe.social
    wrote last edited by
    #4

    @lauren source code is publicly available anyone can inspect audit and verify and reverse engineering does not apply to open saurce aosp and also security researchers legally audit systems like apple iphones all the time apple even runs bug bountys and im not sure what your arguement has to do with arguing im wrong nor does it give a solution becouse you cant say desktops are any different so my question is whats this claim your making and how does it affect anything with my original arguement

    learntoliveprivate@privacysafe.socialL 1 Reply Last reply
    0
    • learntoliveprivate@privacysafe.socialL learntoliveprivate@privacysafe.social

      @lauren source code is publicly available anyone can inspect audit and verify and reverse engineering does not apply to open saurce aosp and also security researchers legally audit systems like apple iphones all the time apple even runs bug bountys and im not sure what your arguement has to do with arguing im wrong nor does it give a solution becouse you cant say desktops are any different so my question is whats this claim your making and how does it affect anything with my original arguement

      learntoliveprivate@privacysafe.socialL This user is from outside of this forum
      learntoliveprivate@privacysafe.socialL This user is from outside of this forum
      learntoliveprivate@privacysafe.social
      wrote last edited by
      #5

      @lauren also I do know its better compare permissions and test weather they work I dont take noones word I actually use and look at devices ill tell you on a comparison microsoft has better permission model and security by default and its a data collection hub compared to even linux by default and they have massive amounts issues as well but defemder is on the moment you turn it on and there security makes its very hard to do things lile change os with out going through alot of steps

      1 Reply Last reply
      1
      0
      • R relay@relay.mycrowd.ca shared this topic
      • learntoliveprivate@privacysafe.socialL learntoliveprivate@privacysafe.social

        @lauren this is innaccurate you have vastly better permission models and security on up to date android and iphones then on desktops this is a missunderstanding of the security and permission models of mobile systems in fact your browser is even better off on your phone due to the permissions and restrictions the phone places on apps in fact your hardware identifier on most phones is blocked from apps on basically all current up to date phones including android since I beleive android 10.

        learntoliveprivate@privacysafe.socialL This user is from outside of this forum
        learntoliveprivate@privacysafe.socialL This user is from outside of this forum
        learntoliveprivate@privacysafe.social
        wrote last edited by
        #6

        @lauren while again linux ufw is not even on by default on most this is not even worth explanation you need to do actual research into the way these things actually work

        learntoliveprivate@privacysafe.socialL 1 Reply Last reply
        1
        0
        • learntoliveprivate@privacysafe.socialL learntoliveprivate@privacysafe.social

          @lauren while again linux ufw is not even on by default on most this is not even worth explanation you need to do actual research into the way these things actually work

          learntoliveprivate@privacysafe.socialL This user is from outside of this forum
          learntoliveprivate@privacysafe.socialL This user is from outside of this forum
          learntoliveprivate@privacysafe.social
          wrote last edited by
          #7

          @lauren ill give you a project get a normal computer say intel look for a location and camera and nearby devices permission in settings

          1 Reply Last reply
          1
          0
          • cy@fedicy.us.toC cy@fedicy.us.to
            You literally cannot know that. You cannot know if the permission model is better. You cannot know the permission model. You cannot know the security. You cannot know the restrictions, and you cannot know your hardware identifier is blocked. You're not allowed to know that. It's illegal for you to know that, considered illegal reverse engineering in the USA, and every country foolish enough to sign a treaty with the USA.

            You're just taking them at their word. A company, a giant company, who you can't hold accountable, and even if you could, there are no consequences for lying to you. In fact they make more money from lying to you, much, much more money, since they get to sell you out, while taking your money. And you think they're not lying through their teeth? It's 100% legal to say a phone is secure, when you know it is not secure, as long as anyone who could press charges isn't allowed to find out.

            CC: @lauren@mastodon.laurenweinstein.org
            learntoliveprivate@privacysafe.socialL This user is from outside of this forum
            learntoliveprivate@privacysafe.socialL This user is from outside of this forum
            learntoliveprivate@privacysafe.social
            wrote last edited by
            #8

            @cy @lauren And this whole charges thing is useless again its open and you show no evidence on desktops exceeding what Ive said and are you taking them at there word evey desktop is built by a big company so whats your point you think that intel chip or m1 from apple is built in a garage lmfao explain how your court arguement would hold up im telling you provable facts your stating some court nonsense that changes nothing

            cy@fedicy.us.toC 1 Reply Last reply
            1
            0
            • lauren@mastodon.laurenweinstein.orgL lauren@mastodon.laurenweinstein.org

              Fun Fact: My smartphone is turned off 95% of the time or so. I only turn it on when I have a specific need for a specific function. The overwhelming vast majority of my activities are on desktop systems, using native code or browsers where the invasive permissions of common mobile apps are generally not present. REMEMBER: The reason so many websites push you to use their mobile apps is that the iOS and Android permission environments provide vastly more opportunities for the collection of your personal data.

              mikesiegel@infosec.exchangeM This user is from outside of this forum
              mikesiegel@infosec.exchangeM This user is from outside of this forum
              mikesiegel@infosec.exchange
              wrote last edited by
              #9

              @lauren when I compare Pi-hole blocks on phone vs desktop, its like 5x at least.

              1 Reply Last reply
              1
              0
              • learntoliveprivate@privacysafe.socialL learntoliveprivate@privacysafe.social

                @cy @lauren And this whole charges thing is useless again its open and you show no evidence on desktops exceeding what Ive said and are you taking them at there word evey desktop is built by a big company so whats your point you think that intel chip or m1 from apple is built in a garage lmfao explain how your court arguement would hold up im telling you provable facts your stating some court nonsense that changes nothing

                cy@fedicy.us.toC This user is from outside of this forum
                cy@fedicy.us.toC This user is from outside of this forum
                cy@fedicy.us.to
                wrote last edited by
                #10
                There's a difference between using a company's chip under protest, and laying down and prostrating for them begging to be used as their customer drone with a shiny magic brick whose contents you are forbidden to know, that you carry along with you wherever you go. Also a difference between having vulnerabilities that cannot be mitigated because they literally shoot you with automatic rifles when you try to inspect their fabrication plant, and just openly embracing every vulnerability on the planet crying out "Hurt me more, daddy!"

                But yes, chip making needs to be nationalized without compensation. By like... anyone. That doesn't make phones any more secure than open source software running on desktop computers, who don't follow you around, and leave much less wiggle room for your attackers to do stuff to you undetected.

                I mean you claim that it's open and verifiable, but laws like the DMCA demand that it not be open, nor verifiable. The few "evil hackers" among us might know how a phone works, but your cops attack them for even trying to tell people, so their knowledge is kinda inaccessible.

                CC: @lauren@mastodon.laurenweinstein.org
                learntoliveprivate@privacysafe.socialL 1 Reply Last reply
                0
                • cy@fedicy.us.toC cy@fedicy.us.to
                  There's a difference between using a company's chip under protest, and laying down and prostrating for them begging to be used as their customer drone with a shiny magic brick whose contents you are forbidden to know, that you carry along with you wherever you go. Also a difference between having vulnerabilities that cannot be mitigated because they literally shoot you with automatic rifles when you try to inspect their fabrication plant, and just openly embracing every vulnerability on the planet crying out "Hurt me more, daddy!"

                  But yes, chip making needs to be nationalized without compensation. By like... anyone. That doesn't make phones any more secure than open source software running on desktop computers, who don't follow you around, and leave much less wiggle room for your attackers to do stuff to you undetected.

                  I mean you claim that it's open and verifiable, but laws like the DMCA demand that it not be open, nor verifiable. The few "evil hackers" among us might know how a phone works, but your cops attack them for even trying to tell people, so their knowledge is kinda inaccessible.

                  CC: @lauren@mastodon.laurenweinstein.org
                  learntoliveprivate@privacysafe.socialL This user is from outside of this forum
                  learntoliveprivate@privacysafe.socialL This user is from outside of this forum
                  learntoliveprivate@privacysafe.social
                  wrote last edited by
                  #11

                  @cy @lauren what does any of your jumbled word salad have anything to do with proving iphones are not more secure and private then desktops by default

                  1 Reply Last reply
                  1
                  0
                  • learntoliveprivate@privacysafe.socialL This user is from outside of this forum
                    learntoliveprivate@privacysafe.socialL This user is from outside of this forum
                    learntoliveprivate@privacysafe.social
                    wrote last edited by
                    #12

                    @cy @lauren your just taking your beliefs and spitting them out like there facts that change anything you beleiving chips need to be nationalized has nothing to do with anything your actually showing complete lack of understanding.

                    1 Reply Last reply
                    1
                    0
                    • learntoliveprivate@privacysafe.socialL This user is from outside of this forum
                      learntoliveprivate@privacysafe.socialL This user is from outside of this forum
                      learntoliveprivate@privacysafe.social
                      wrote last edited by
                      #13

                      @cy @lauren also cops can get into computers way easyer then phones you have no idea but im done here beleive as you wish.

                      1 Reply Last reply
                      1
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups