• 7 Posts
  • 929 Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle


  • I think lineage is a good operating system for a limited exposure use cases. Like a project phone on a safe network, or as a webcam, or is like a embedded hardware controller. But not on the raw internet, not processing raw internet data, not with open Wi-Fi, not with open Bluetooth.

    Even with all of that, it should still be segmented from the rest of the network



  • You can use a hardware security key, like a yubi key, or a software fido2 equivalent.

    That way it satisfies the two factor requirement, without using a phone number.

    For initial registration you can use an SMS service like SMS pool or the others, you pay a little money, you receive a real text message to a real phone number. You just don’t have access to that number in the future

    Your voice, vocabulary choice, lighting conditions, power interference frequency, can all give away parts of your location and identity. You have to choose what level of paranoia is sufficient

    The most anonymous, would be to have a v-tuber like model, respond and parrot LLM generated voice audio, from a script that’s been translated a few times. Or pay a voice actor from Fiverr to read your script.

    Of course this whole time, using a VPN.



  • I think this person is just permanently a contrarian.

    Randomizing the numbers does provide good security, because there’s no longer an oil imprint on the most frequently used numbers on the phone, making guessing the pin code much harder before the TPM locks the phone.

    Phones are full fledged computers nowadays, with Android you can have different profiles. For their level of paranoia, they could have a profile they never use in public, and only login with a full password, only when they’re in a secure location.

    For the randomized pin, and biometric two-factor use of a phone, that covers most use cases, and is quite secure compared to most models of data security average civilians use.

    You can have different scopes, if you’re in a crowded place, reading Lemmy isn’t really a big security risk. But logging into your banking would be. All of that is possible on Android, the fact that they’re so staunchly pro computer, is difficult for me to take their analysis seriously







  • TPM in the SOC to transform the “convenient” pin into more robust encryption keys is the gold standard for civilian devices.

    “computers” (of which a phone very much is) also use a TPM for this very reason.

    But even taking what you say as gospel, the device isn’t insecure, its how people are using it.

    I will stand by my comments a phone is the MOST secure device a civilian will use. Even with a secured desktop computer where someone diligently types in a 64 bit random code to unencrypt the hard drive… if they use the computer as a general purpose device, the threat surface raises dramatically. Now information and programs are not compartmentalized, install one bad program and it can trivially take over everything.



  • I think phones are the MOST secure devices most people have. They are locked down, they run software in very restricted containers, they have more restrictive feature allowance. for 99% of the people the phone is the most secure device, full stop.

    Can you do better on a computer? Sure, but it takes a bunch of work and isn’t the out of box experience



  • jet@hackertalks.comtoPrivacy@lemmy.mlIs pixel 4a too old for a new phone?
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    3
    ·
    2 days ago

    The hardware driver updates are absolutely critical if you want to have a secure phone. The phone has to be within the support window, to get any hardware driver updates. The risk surface of a phone’s hardware is huge, you’ve got the Bluetooth drivers, you’ve got the Wi-Fi drivers, you’ve got the modem drivers, and any other sensors I may have forgotten about.