Conversation

Don't hand over your email. Don't hand over your name. Don't hand over your social media. Don't hand over any personally identifiable information to use Bitcoin, no matter how new and shiny the latest toy is. The biggest gaping security hole is the one you dig yourself.
10
461
> Gsm chip for example is connected to memory bus and can read any memory location Whether or not a component is part of the SoC isn't directly connected to whether or not it's isolated. Separate chips often have DMA, and SoC components usually have better IOMMU configuration.
2
The desktop Linux software stack is a substantial downgrade from the Android Open Source Project, drastically rolling back privacy and security to an extreme extent. The SoC choice is also a security downgrade, and either way it's still all proprietary rather than open hardware.
1
I don't think it's okay to propagate falsehoods for self-promotion, even if they think the ends justify the means. They are offering a nice feature (kill switch for microphone) while losing dozens of standard hardware security features and moving to a far inferior software stack.
1
And of course marketing gets repeated as fact, spreading misconceptions and leading people to make bad decisions about their privacy/security leading to very real harm occurring. There is not currently an announced product that will actually compete with iPhone privacy/security.
1
Show replies