26
you are viewing a single comment's thread
view the rest of the comments
[-] IceFoxX@lemmy.world 1 points 1 week ago* (last edited 1 week ago)

They just chuckle to themselves and think: “These idiots have forgotten about things like SS7 and mobile networks in general… or triangulation… and that methods like UXDT still exist.” The safe way to handle any Android device is to assume it’s compromised from the start and not trust it at all—everything else is just a smokescreen. Why do you think cryptophones are being taken off the market, but pure software solutions are still allowed... What about the hardware... undocumented instruction sets, etc., etc. You can’t trust either the software or the hardware... Oh yeah, the devs say everything’s fine... but users completely forget about possibilities like NDAs...

this post was submitted on 07 May 2026
26 points (100.0% liked)

Privacy

4509 readers
75 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS