• cy_narrator@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    4
    ·
    edit-2
    8 months ago

    If you are a high value target, you should not carry normal phones made for normal people.

    Its sad that none of the dumb phones were built with security in mind. Linux phones are the second best option, GrapheneOS and CalyxOS would be the least you should go.

    Alot of people told me “No these old phones cannot do modern crypto” and I am like they managed to put in full 3d games for Nokia 5130c2 and 5300 such as “1916 Dogfight” and “Need for speed carbon” I am sure these phones have enough processing power to do all the modern crypto if someone tried to.

    • uis@lemm.ee
      link
      fedilink
      English
      arrow-up
      13
      ·
      8 months ago

      Modern crypto is often faster than old crypto. For example eliptic curve crypto in software is faster than AES in software

    • rottingleaf@lemmy.zip
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      8 months ago

      if someone tried to

      Cryptography is what you yourself first need. Also - depends for what, if we are not using hardware acceleration. Encrypting text - yeah. Voice - may be more problematic.

      Also consumer hardware and software is generally not designed to protect high value targets.

      It’s intended for protection against crooks and hooligans, which is necessary for businesses, which is an incentive for vendors.

      Providing protection against nation states is something which may even be considered a bad thing.

      • cy_narrator@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        8 months ago

        Maby it would be problematic for real time communication like voice when it comes to encryption but these phones do not even try to do text encryption bugs me.

        I think we should just feel okay to say “I dont know what advice to give you if you are targeted by a nation”

        • le_saucisson_masquay@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          8 months ago

          We know what snowden does, and this guy is targeted by the usa. Basically never use phone, only computer on ethernet running qubesos from external drive on computer bought with cash.

          It’s not a secret by now.

    • le_saucisson_masquay@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      15
      ·
      8 months ago

      Linux on phone is great for privacy but can you say that on security ?? It’s open source, not very popular. We’ve seen how it can go wrong recently.

      Id put it in third after grapheneos. But the end result is that it’s not suitable anyway.

          • Aniki 🌱🌿@lemm.ee
            link
            fedilink
            English
            arrow-up
            11
            arrow-down
            1
            ·
            edit-2
            8 months ago

            There’s no “us” – just your dumbass.

            It’s open source, not very popular.

            • le_saucisson_masquay@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              10
              ·
              8 months ago

              Your dumbass should check XZ Backdoor.

              It was open source, yet only blind luck led a Microsoft developer to uncover it. It would have gone in most Linux installation otherwise.

              All because of an unpopular package that was maintained by a very few people.

              • Aniki 🌱🌿@lemm.ee
                link
                fedilink
                English
                arrow-up
                11
                arrow-down
                2
                ·
                edit-2
                8 months ago

                Which was an exception to the rule and found immediately because of open source but go on with your bad self. Hell, they did so much investigative work they figured out it was a Russian hacker masquerading as a Chinese hacker.

                • bitfucker@programming.dev
                  link
                  fedilink
                  English
                  arrow-up
                  7
                  arrow-down
                  1
                  ·
                  8 months ago

                  Wait, they have figured out the source now? Can you give me the link for more reading on how they did it?

                • le_saucisson_masquay@sh.itjust.works
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  3
                  ·
                  8 months ago

                  Exception to the rule ?? I’d argue you have no idea how many times it succeeded because that’s the point. We only know what failed, if this worked I have no doubt that companies running Pegasus which have hundreds of millions of dollar of budget every year can success.

                  Open source when not maintained properly is fundamentally flawed, there just need one weak element in the chain, one package maintained by a handful of people on their own time.

                  • CrazyLikeGollum@lemmy.world
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    7 months ago

                    Do you know how many times Microsoft has had a supply chain attack inject a critical vulnerability into Windows? Or how many times a malicious insider at Apple has added a backdoor to iOS?

                    Nope, and you cant possibly know because those systems are closed.

                    With open source software you have the ability to audit the code for vulnerabilities. We have the ability to reasonably state that that incident was an exception to the rule because its so easy to see the available code and major security incidents tend to become major news.