86
Comparison of Android ROMs (eylenburg.github.io)
you are viewing a single comment's thread
view the rest of the comments
[-] TCB13@lemmy.world 1 points 1 year ago

The attack you're describing is a typical automated thing where hackers are exploiting dozens of devices in some automated fashion, that can happen but the damage is different. They might get your data but that's usually sold on the black market in a bundle of compromised data. It will take some time for the info to get sold and for the buyer to act on it and sometimes it may never act - after all you're one compromised device among millions. Even if the buyer it's more likely he'll simply use your device in a botnet to fake clicks on ads or DDoS something and profit that way. The key aspect of those attacks is that you've time to flag suspicious activity and act.

However if you carry an unlocked phone and someone steals that from you there's a very high chance that it isn't a random burglary, according to statistics most burglaries are committed by someone who knows victim aka is targeting you specifically. If you're targeted by someone or some entity they'll want your data and accounts and they'll have the time, resources and attention focuses towards you giving you little to no time to react. This is why I would NEVER use a phone without a secure bootloader.

this post was submitted on 31 Oct 2023
86 points (97.8% liked)

Privacy

31894 readers
519 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS