I guess, but vuln counting as a method of comparison is poor. Maybe comparing apis (eg file encryption) gives you a sense of platform priorities, but even that’s tough. I’d recommend iOS because it’s hard to know *which* android oems are safe, but not because “upper management.”
-
-
I'm not trying to suggest that this paper damns that specific phone, though I understand why I've created the impression. Asking now in good faith: if I tell a political campaign manager or journalist to use a Pixel, is this equivalent security to having them use an iPhone?
-
1/2 Well, I’m not in infosec, but I would be surprised if attackers go for either a top of the line iPhone or a top of the line Pixel. They’ll go after staffers’ Windows desktops first, or just use phishing.
- 1 more reply
New conversation -
-
-
No Congressional candidate is going to lose a race because a malicious USB port stole their phone’s IMEI.
-
(Not to mention that the only mention of the Pixel in the study is to state that it is *protected* from attempts to send AT commands to the modem!)
End of conversation
New conversation -
-
-
Right, it's all the non-pixel devices, whose OEMs/ODMs/Operator-partners are not bound to do high-quality/fast-mandatory-update work that Apple can require as part of its brand but based on hgiher ARPU and distantly related stock market cap.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.