16
submitted 1 week ago* (last edited 1 week ago) by MTK@lemmy.world to c/cybersecurity@sh.itjust.works

Hi, I have a pixel 4a that I love and works great (with CalyxOS) I bought it when it came out and I really don't want a new phone, but...

Security updates from google stopped for the 4a about a year and a bit ago, and for the last year I have been slowly getting more and more anxious while trying to ignore it. I'm still getting the android security updates (software) for another year or so (thanks calyx!) But I'm not getting the firmware security updates anymore.

I'm experienced in the field of cyber security and I feel like I'm in denial because I really really don't want to buy a new phone.

Please tell me if I really should get a new phone or not...

My threat model would be just an average person but with the added paranoia of knowing too much about privacy and security, and my avoidance of getting a new phone is mostly rooted in zero-waste ideology and the pure hate towards google for forcing me to stop using a great phone that would otherwise probably be usable for another few years.

you are viewing a single comment's thread
view the rest of the comments
[-] jet@hackertalks.com 2 points 1 week ago

I'm experienced in the field of cyber security and I feel like I'm in denial because I really really don't want to buy a new phone.

Then you know the answer already. Bite the bullet.

[-] BearOfaTime@lemm.ee 5 points 1 week ago

Meh, security isn't one thing, it's layers.

Everything always has risks. 0-days most notably.

Take a look at the NTLM risk that was just announced - every version of Windows is susceptible to it. Minimizing access to small groups is what has kept smart businesses safe from it. Along with things like isolating primary systems on a VLAN with no direct access, unless authorized by more than one person, and through well-configured, specific mechanisms.

Everywhere I've worked has had to run expired OS's for one thing or another - typically CNC type systems that were built for DOS or maybe XP. Do we stop running those systems just because the OS is no longer supported? No - they either get air-gapped or run on a very isolated VLAN with very strict access controls.

Then there's the person's threat model. Who is likely to be after you? Do you run questionable apps or just basic ones? Do you have Google services (it's a risk in my opinion)? Does your phone have a firewall? Do you block network access for apps that shouldn't need it? Do you separate apps into user profiles to keep data from leaking across them? Do you use a VPN? Maybe a mesh network to your own systems, with all internet traffic going there, then filtered by that firewall or IPS/IDS?

Lots of ways to skin the cat, but most importantly is to maintain layers. Layering is why MFA is such a big thing right now - it's another access control layer.

I run a bit wild, I admit it. But my threat model doesn't include people specifically coming for me, or state-level actors. I do have some data-destruction mechanisms in place, just in case.

[-] MTK@lemmy.world 3 points 1 week ago

Thank you 🥲

this post was submitted on 11 Dec 2024
16 points (94.4% liked)

Cybersecurity

5834 readers
150 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS