view the rest of the comments
Android
DROID DOES
Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
Rules
1. All posts must be relevant to Android devices/operating system.
2. Posts cannot be illegal or NSFW material.
3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.
4. Non-whitelisted bots will be banned.
5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.
6. Memes are not allowed to be posts, but are allowed in the comments.
7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.
8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.
Community Resources:
We are Android girls*,
In our Lemmy.world.
The back is plastic,
It's fantastic.
*Well, not just girls: people of all gender identities are welcomed here.
Our Partner Communities:
Just because you don't understand what security patches are doesn't mean your phone can't be exploited, especially when it's running an os that's half a decade old.
Explain how my phone can get hacked then
There are literally hundreds of security vulnerabilities in Android 8 and 9.
https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/version_id-564242/Google-Android-8.0.html
Several of which allow remote code execution (meaning if exploited, attacker would have full control of your device, likely without you knowing). These vulnerabilities can be exploited a number of different ways, for example, this one would just require that your Bluetooth radio is turned on- https://www.cvedetails.com/cve/CVE-2021-0316/
This one just requires that you open a text message an attacker sends you- https://www.cvedetails.com/cve/CVE-2020-8899/
This one just requires NFC on your device to be on (which most phones have and is usually on by default) https://www.cvedetails.com/cve/CVE-2020-0073/
Don't run old OSes. 90% of the reason new versions come out is to fix these issues.
Thanks for the effort but i still prefer non-bloated OSes with less data collection. I don't see anyone complaining about their device being remotely hijacked outside the internet.
Many of these exploits don't require that the person using the phone even knows they're in use bud. You do you, but know that your phone will likely be hijacked to be used as a crypto miner at best. At worst literally all your data will be exfiltrated.