• 1 Post
  • 147 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle









  • 9tr6gyp3@lemmy.worldtoPrivacy@lemmy.mlDeAmazoning a FireTV
    link
    fedilink
    arrow-up
    13
    arrow-down
    9
    ·
    1 month ago

    You can get an Apple TV, which is an external device you connect to your TV if you’re already in the apple ecosystem. You can use your iPhone as a remote for it.

    There is also the Nvidia Shield option, which is a solid Android TV option.

    And of course, you can just use any pc as an input device and use that.

    The firmware thats actually on the “smart tv” might be tough to replace with an open source solution. Im sure there are some TV modders out there, but its probably very niche. Best to get an external device of your choice imo.







  • See first paragraph again, not everybody is as affluent as you’re, look at the problem from the other perspective

    There is no blanket advice for which device to use. You will have to look it up yourself. But if you’re using a phone beyond its supported time, then you are vulnerable.

    will take control of the phone from the inside out, nothing will withstand that

    Nothing can withstand a 0-day attack, but it’s on your manufacturer to prevent a 1460-day attack.

    Pegasus will use 0day, nothing to do about that

    See above statement.

    Once somebody have physical access because you’re some POI and not an average Joe, not much you can do

    You can be a random person walking in a busy metro area and happen to get in range of someone who is scanning for a particular device to use a side-channel attack on. You don’t have to be a POI.

    See first paragraph, parenthesis content. Also phones are made with short lifespan on purpose, this gives steady inflow of money for the manufacturers, only few will give you what you want

    The manufacturers are still responsible for patching their devices. Once they stop doing that, you should know that device can’t be trusted with your privacy and security. This is the minimum baseline standard. If you are trying to extend the life of a device by yourself, and use it as a daily driver, you have decided that your data is free for anyone to have.


  • It’s generally best to get a phone that receives software updates and security patches for more than 2-3 years. This is because vulnerabilities can be discovered in older hardware that cannot be fully fixed with a software update alone. While updating the OS helps with security at that level, flaws in the underlying hardware may still exist. Additionally, threats can come from various sources like malicious apps, texts, USB devices, or physical access, not just online attacks. Choosing a manufacturer that supports phones longer can help reduce these risks over the life of the device.


  • If a rootkit is hiding at the hardware level, it may not matter what operating system or web browser you’re using on your phone. A rootkit at this low level could potentially evade detection by the OS and modify files or memory without the operating system’s knowledge. It may also be able to disrupt secure boot processes and monitor radio transmissions like Bluetooth, WiFi, and NFC.

    Once an exploit is found that works on a particular device model, and attackers know the device manufacturer will never release firmware updates again, they could start searching for any users of that phone model. A rootkit installed this way may remain on the phone permanently since firmware updates are no longer being provided. The phone user may be unaware their device has been compromised.

    LineageOS does not employ a dedicated security engineer for each phone model. Maintainers with LineageOS typically take the latest firmware from the original device manufacturer and import it into their build process. But if the latest firmware release from the manufacturer is already three years old, it’s possible there may now be several undiscovered vulnerabilities in that outdated code.