While it's true that keeping the bootloader unlocked does create an attack vector, I never had a problem with it. As long as unlocking and locking it again did not require a lot of effort, then I'd likely do it. 😁 🙏 💚 ✨ 🤙
!DIY
While it's true that keeping the bootloader unlocked does create an attack vector, I never had a problem with it. As long as unlocking and locking it again did not require a lot of effort, then I'd likely do it. 😁 🙏 💚 ✨ 🤙
!DIY
#GrapheneOS can be installed on phones which allow both unlocking and relocking the bootloader, though only G phones are supported. 🤯🤓
!DIY
Indeed, I've heard a lot about GrapheneOS quite a lot lately, though I don't have any experience with it yet. 😁 🙏 💚 ✨ 🤙
!BEER
One drawback of that OS is that it can be installed only on Pixel phones, which already turns some potential users away. 🤯🤓
!DIY
Yes, I've seen that. The most important features on a phone for me are a very good camera, a lot of internal storage, and a slot for an SD card, aside from an unlocked bootloader, which unfortunately I can't get from my present carrier. 😁 🙏 💚 ✨ 🤙
!DIY
People who are highly knowledgeable about computers say that the hardware itself of the device is also a potential attack vector. 🤯🤓
!DIY
Yes, sadly that is very true. Some chip makers put back doors on their CPUs, that can be accessed regardless of the OS. There are other components like that as well. 😁 🙏 💚 ✨ 🤙
!DIY
The question is why they do that. 🤯
I have read articles about "fully open-source" hardware and software where every step of the production of the smartphone can be verified, though those phones aren't powerful enough for their price (since what is mostly paid for is the security of those devices). 🤓
!DIY
You can query your personal balance by
!DIYSTATS
You can query your personal balance by
!DIYSTATS
You can query your personal balance by
!DIYSTATS
You can query your personal balance by
!DIYSTATS
You can query your personal balance by
!DIYSTATS
You can query your personal balance by
!DIYSTATS