[-] grid11@lemy.nl 1 points 2 months ago

if this is used, or there is some whitelist that gives permission for background microphone use in voice interaction services, apps with tracking capabilities probably use some set of predefined keywords (hardcoded inside the app itself) and those can be triggered while being on standby/in background, when there is a match some pinging goes to outside servers...

[-] grid11@lemy.nl 1 points 2 months ago

... and with the help of inflation hack

10
submitted 5 months ago by grid11@lemy.nl to c/news@lemmy.world
25
submitted 5 months ago by grid11@lemy.nl to c/opensource@lemmy.ml
13
submitted 5 months ago by grid11@lemy.nl to c/technology@lemmy.zip
14
submitted 5 months ago by grid11@lemy.nl to c/technology@lemmy.zip
24
submitted 5 months ago by grid11@lemy.nl to c/videos@lemmy.world
8
submitted 5 months ago by grid11@lemy.nl to c/technology@lemmy.zip
[-] grid11@lemy.nl 1 points 5 months ago

It's generally best to get a phone that receives software updates and security patches for more than 2-3 years.

See first paragraph again, not everybody is as affluent as you're, look at the problem from the other perspective

Additionally, threats can come from various sources like:

malicious apps,

will take control of the phone from the inside out, nothing will withstand that

texts,

Pegasus will use 0day, nothing to do about that

USB devices, or physical access,

Once somebody have physical access because you're some POI and not an average Joe, not much you can do

Choosing a manufacturer that supports phones longer can help reduce these risks over the life of the device.

See first paragraph, parenthesis content. Also phones are made with short lifespan on purpose, this gives steady inflow of money for the manufacturers, only few will give you what you want

[-] grid11@lemy.nl 1 points 5 months ago

So for the average users that only want to go on with their lives and not buy brand new phones every 2-3 years (or don't live in places where fairphone and pixel phones are available) what would be the solution?

If a person is not some POI, don't you think that wouldn't be better to flash something that at least includes some relatively up to date security patches?

And how those rootkits are being loaded to phones with outdated firmware? Bundled with the last OS that was flashed or remotely by exploiting security flaws? Not a dev, but curious about it.

347
submitted 5 months ago by grid11@lemy.nl to c/news@lemmy.world
-2
submitted 5 months ago by grid11@lemy.nl to c/e_os@lemmy.world
14
submitted 5 months ago by grid11@lemy.nl to c/degoogle@lemmy.ml
42
submitted 5 months ago by grid11@lemy.nl to c/android@lemmy.world
55
submitted 5 months ago by grid11@lemy.nl to c/e_os@lemmy.world
[-] grid11@lemy.nl 1 points 6 months ago

Update: it's back, works differently now.

Aurora Store Changelog : v4.4.4 (58)

• Ability to export downloads to an external location

213
submitted 6 months ago by grid11@lemy.nl to c/signal@lemmy.ml
view more: ‹ prev next ›

grid11

joined 7 months ago