celmit to Android@lemmy.worldEnglish · 1 year agoMurena 2 is a de-Googled Android phone with a privacy kill switch that disconnects mic and cameraliliputing.comexternal-linkmessage-square86fedilinkarrow-up1376arrow-down114
arrow-up1362arrow-down1external-linkMurena 2 is a de-Googled Android phone with a privacy kill switch that disconnects mic and cameraliliputing.comcelmit to Android@lemmy.worldEnglish · 1 year agomessage-square86fedilink
minus-squareSir_Simon_Spamalot@lemmy.worldlinkfedilinkEnglisharrow-up4arrow-down5·1 year agoWhat are you talking about? It’s using e/OS
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up14·1 year agoFirmware, as in the drivers that control the hardware, like the radio, the Bluetooth, the NFC, the SIM decryptor, etc.
minus-squareReginaPhalange@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoIs there any open firmware for those modules?
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up2·1 year agoMore or less, no. No hardware driver open source firmware exists for anything you’d want to buy But if you’re interested in reading is excellent, please see these references https://en.m.wikipedia.org/wiki/Replicant_(operating_system) https://en.m.wikipedia.org/wiki/OsmocomBB https://en.m.wikipedia.org/wiki/List_of_open-source_mobile_phones Some architectures like the pine phone, and the librim 5 try to isolate the proprietary blob so they have minimal collateral damage when they’re exploited.
What are you talking about? It’s using e/OS
Firmware, as in the drivers that control the hardware, like the radio, the Bluetooth, the NFC, the SIM decryptor, etc.
Is there any open firmware for those modules?
More or less, no. No hardware driver open source firmware exists for anything you’d want to buy
But if you’re interested in reading is excellent, please see these references
https://en.m.wikipedia.org/wiki/Replicant_(operating_system)
https://en.m.wikipedia.org/wiki/OsmocomBB
https://en.m.wikipedia.org/wiki/List_of_open-source_mobile_phones
Some architectures like the pine phone, and the librim 5 try to isolate the proprietary blob so they have minimal collateral damage when they’re exploited.