Conversation

Replying to
But as long as your phone is turned on, even with "location permissions" disabled, the radios in the phone that connect it to all the nice things you like are screaming into the air, reporting your presence to nearby cell towers, which then create records that are kept forever.
70
2,282
Software is equally important. The iOS and Android operating systems that run on nearly every smartphone conceal uncountable numbers of programming flaws, known as security vulnerabilities, that mean common apps like iMessage or web browsers become dangerous: you can be hacked.
33
1,633
This Tweet was deleted by the Tweet author. Learn more
It doesn't support the Nexus 6P anymore since that device doesn't meet the security standards and is also end-of-life without full security updates available. It has never supported it while being known as AndroidHardening or GrapheneOS, only during the previous incarnation.
3
This Tweet was deleted by the Tweet author. Learn more
The Librem 5 doesn't meet the basic security expectations of GrapheneOS including having full security updates. It will ship on day one with serious vulnerabilities and no way to fix them. Similarly, it doesn't meet a lot of other standard privacy/security expectations either.
2
2
The current hardware targets already have isolation for hardware components including the baseband. The claim that they do not is dishonest misinformation that they're repeatedly spread in their marketing. In general, that has been their approach: attacking others with lies,
1
1
This Tweet was deleted by the Tweet author. Learn more
An audio recording kill switch has substantial value as a final line of defence after the device has been compromised and all the data on it has already been obtained. They aren't providing one, but rather one disabling only a portion of the hardware able to do audio recording.
1
1
Of course, when turning on audio recording to do something like an encrypted voice call via Signal, the attacker will be recording that like everything else. The threat model for the other kill switches is unclear. Camera switch can be useful but can be approached other ways too.
1
This Tweet was deleted by the Tweet author. Learn more
Show replies