Conversation

Replying to and
I didn't say that. I pointed out that a Nexus 5 has hundreds of serious, unfixed disclosed vulnerabilities regardless of which custom ROM you choose. They don't even come close to addressing the problem of it being end-of-life.
2
Replying to and
Using an alternate OS preserving the standard security features and providing full security updates is great. Even better if it builds upon the baseline security of AOSP rather than rolling it back with added attack surface, crippled SELinux policy and disabled mitigations.
1
Replying to and
You have a serious misunderstanding of what I've been saying. Good: using a robust alternative OS with full security updates on a device with proper support for other OSes. Bad: using an OS substantially reducing security from AOSP and not providing the full security updates.
1
Replying to and
What is the OS is going to do to protect you when you have a Wi-Fi SoC running a secondary OS vulnerable to assorted remote exploits, and with zero isolation from the rest of the system? An attacker gaining code exec there has kernel / root in the OS without an IOMMU set up...
1
Replying to and
... and that's exactly how Wi-Fi is set up on the vast majority of Android devices. Those firmware security updates for Wi-Fi / Bluetooth are crucial, as are ones for the GPU, audio/video decode and other components. Not sure how you can ignore the drivers/kernel either. *shrug*