Embed Notice
HTML Code
Corresponding Notice
- Embed this notice
翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Wednesday, 26-Jul-2023 22:52:50 JST 翠星石
@dushman Riddle me this.
If you only install free software via f-droid on an replicant device, what insecurity replicant software wise is there to exploit?
Sure such mobiles can be completely compromised via the mobile chipset (maybe not the main processor that easily on newer mobile devices since IOMMU, but has any IOMMU implementation ever been audited?), but that's true for every single tracking device.