• Marius@mastodonapp.uk
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    2 years ago

    @shreddy_scientist @Grouchy Any device connected to a wireless technology lacks full security and privacy.

    You might carry on your mobile phone with you as there are lots of other functions you can do on it. But, in order to benefit from full privacy and security you should disable: cellular modem, wifi, bluetooth, nfc, uwb. And you must run an operating system that is entirely open source to be sure that these components stay off after you disabled them.

    • comfy@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      There is no such thing as “full security and privacy”. It doesn’t exist and it’s not a useful goal.

      Security and privacy don’t exist as absolute values. Things are not universally more or less secure than other things. You need to understand things like the needs of a situation (e.g. you correctly pointing out a modern phone has more use-cases than a landline), who the threats are, and what their capabilities are. Putting a decent password on an iPhone makes it adequately private and secure against my parents. Using a landline is not adequately secure against a government agency. Know Your Enemy!

      As for your advice, a quick counter:

      • FOSS does not imply correctness. In fact, FOSS is great because we know for a fact it has and always will have bugs! That helps us know his much to trust it instead of being a mystery like proprietary junk. So while I personally trust GrapheneOS to do those tasks better than stock ROMs, that line of reasoning is dangerous and historically known to be inaccurate.
      • FOSS is on the software level anyway, certain adversaries are capable of attacking at the hardware level. Typical scammers aren’t. Who’s your threat??
      • Marius@mastodonapp.uk
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        2 years ago

        @comfy Indeed you need context, but let’s limit the concept “full security and privacy” to aspects that are under your control. E.g you might control the physical security of your phone, but you might not control how many men-in-the-middle are between you and the rest of the internet. Like any regular technology user my threat actors are big-tech and establishments.