4
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 11 Jan 2026
4 points (70.0% liked)
Privacy
44365 readers
128 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 6 years ago
MODERATORS
You are better ordering from neither. Amazon group batches their inventory. Their "sellers" appearance is just a price fixing scam. There is no way to trace the stuff Amazon sources to any specific seller. So everything from them is sketchy. The same applies with eBay. Most people are legitimate, but there is no effective way to tell who is or is not legitimate.
There are two ways of looking at this. One, assuming you will install Graphene, the way Graphene uses the Trusted Protection Module TPM chip is to not trust any unregistered code. So a person will not be able to do much to the device to compromise it as far as I am aware. This is conventional type attacks. The second way is more abstract of what is technically possible but improbable and probably never happens in the wild. For instance, one unlikely aspect to be attacked may involve the modem. I am not certain what the Pixel's actual architecture involves between the SoC and peripherals. Often, the modem on mobile devices is another sophisticated microcontroller. This is capable and entirely independent compute device. The OS is interfacing with some kind of API, but is not privy to what is actually running on this hardware. If it was eavesdropping and communicating over cellular or WiFi, you would not know about it. These devices are undocumented and proprietary hardware too. The orphan kernel scam used to artificially depreciate hardware is based on the proprietary undocumented SoC and modem.