I don't really care about the marketing as much as I do tangible defects in the current hardware offerings you may be aware of. If you get time to share those I would love to hear them.
Conversation
As far as ethics.... Every hardware bender is unethical at some level. I have to pick the hardware with the most flexibility and that seems like the Librem5 until I learn otherwise from you.
1
1
If they punch babies that is not ideal, but that is separate from specific concerns with the hardware and firmware they produce.
2
And there are serious issues with the hardware / firmware including them going out of the way to sabotage security. They are against being able to ship firmware updates in the first place, unless the firmware has no signature verification, otherwise they see it as mandatory to
1
at least block updating it from the OS and it's probably really required to block updating it at all to fit the requirements they have chosen. Couple that with deliberately not setting up the SoC / CPU in a secure way including on their laptops and other issues like badly chosen
1
components based on criteria for choosing it not aligned with privacy/security. I really think you're better off with the Pinephone which while using lower end, more outdated hardware has compatible goals (just different ones) and doesn't have active sabotage in these areas.
1
1
I don't really see how something designed to be locked down in a way that even a Pixel is not (i.e. going out of the way to sabotage firmware updates to remove that option from users and operating systems) is more flexible, or what advantage there is to sketchy component choices.
2
Can you elaborate on sabotaging firmware updates? This point has remained unclear.
2
"The SPI flash will be read only so the firmware blobs [run on the secondary processor] can’t be modified without the user knowing."
This all stems from seeking RYF certification and making use of the secondary processor exception.
1
This is just one example. There are other ways it is approached. It is also part of how they make their laptops. So, if the firmware has signature verification, they'll block updating it somehow. If it doesn't, it'll still end up being blocked since components lack open firmware.
If there is a security feature that they see as reducing 'freedom' (with a very odd way of defining freedom) it will be deliberately left either not set up or permanently disabled via fuses. They see it as failure if there is any signed or closed firmware that can be updated.
1
1
And the 'solution' which is applied is preventing it from being updated. This is the MAIN CRITERIA for their choice of components: whether they can block firmware from being updated. So for example, if there are separate data lines for firmware updates, that's perfect to them.
1
Show replies


