Disclaimer: i'm not affiliated with with anything i post.
Privacy @lemmy.world Firefox added ad tracking and has already turned it on without asking you
Privacy @lemmy.world Signal under fire for storing encryption keys in plaintext
Privacy @lemmy.world Microsoft CEO of AI: Online content is 'freeware' for models
Privacy @lemmy.world To those of you with nothing to hide: One day you might have. Because you don’t make the rules.
Android @lemmy.world New Medusa malware variants target Android users in seven countries
Privacy @lemmy.world ‘AI is reliant on mass surveillance’ and we should be cautious, warns head of messaging app | 7.30
Privacy @lemmy.world Proton is transitioning towards a non-profit structure | Proton
Privacy @lemmy.ml Securing a Personal Android Phone
Privacy @lemmy.world YouTube tests harder-to-block server-side ad injection in videos
- JumpDeleted
Permanently Deleted
Privacy @lemmy.ml GrapheneOS Now Supports a Duress Reset PIN
Privacy @lemmy.world GrapheneOS Now Supports a Duress Reset PIN
Android @lemmy.world Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Privacy @lemmy.world What is Windows 11 'AI Explorer'? Everything you need to know about Microsoft's upcoming defining AI PC feature (this will be used for tracking)
Android @lemmy.world New Brokewell malware takes over Android devices, steals data
Android Apps @lemmy.world Auditor, Hardware-based attestation / intrusion detection app for Android devices. Version 79
Android Apps @lemmy.world BeauTyXT, beautiful, private, secure, and minimalistic Text, Markdown, and Typst editor. Version v.0.21.2
Privacy @lemmy.world Google to crack down on third-party YouTube apps that block ads
Privacy @lemmy.world Microsoft now testing app ads in Windows 11's Start menu









What do you mean ? This has nothing to do with GrapheneOS in the first place (which by the way has been created in 2014. The article i linked refers to 2021).
Reverse engineering is a thing. It always has been. If every piece of closed source was a blackbox how can you explain exploitation ? How can bad actors exploit Windows, MacOS, CPU firmware and so on ? Your argument here is not practical. Also, why should Google put a backdoor inside a chip ? They already get every information they what directly from the people agreeing to use their software. So, why bother ? Moreover, every phone on the market has closed source firmware.