this post was submitted on 07 May 2026
26 points (100.0% liked)
Privacy
4553 readers
81 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
They just chuckle to themselves and think: “These idiots have forgotten about things like SS7 and mobile networks in general… or triangulation… and that methods like UXDT still exist.” The safe way to handle any Android device is to assume it’s compromised from the start and not trust it at all—everything else is just a smokescreen. Why do you think cryptophones are being taken off the market, but pure software solutions are still allowed... What about the hardware... undocumented instruction sets, etc., etc. You can’t trust either the software or the hardware... Oh yeah, the devs say everything’s fine... but users completely forget about possibilities like NDAs...