Same screen power costs and increased usage of networking. It's likely going to end up using more power if it's as functional.
Your threat model seems really warped & out of touch with the reality of how vulnerable Android devices are.
-
-
You're the one with warped perceptions, bias, lack of experience, and lack of threat modelling.
-
Attacker breaking into home/office & successfully tampering w/phys tamper-resistent server != normal person's threat model.
-
Device seizure at border or traffic stop & browser-sandbox-escape drive-by malware OTOH are in normal person's threat model.
-
This doesn't do anything to mitigate either.
-
Seizure is completely mitigated by having no data on the device.
-
Browser exploits are mitigated by having a sufficiently powerful cpu on the server to be running something Qubes-like.
-
Virtualization works fine on existing mobile hardware. Implementing that is not a hardware issue.
-
Virtualization also isn't the only good approach to tight sandboxing, and is used for compatibility not security properties.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.