view the rest of the comments
politics
Welcome to the discussion of US Politics!
Rules:
- Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.
Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.
Example:
- Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
- Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
- No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
- Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
- No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
That's all the rules!
Civic Links
• Congressional Awards Program
• Library of Congress Legislative Resources
• U.S. House of Representatives
Partnered Communities:
• News
See I find this trend kind of interesting. Performance in desktop PC's plateaued long ago, and soon after laptops, then phones were a little way behind but now they're at the same point. There really isn't that much benefit to getting a new phone, so long as your current phone still works (and the main thing there is battery life).
Phones definitely need to be more open. However, I believe that state actors have got their fingers far too deep in the pie - no open source hardware has ever managed to find its way to market, because doing so would deny low level access to the device, perhaps via the black box "security chips" that encryption is often offloaded to. But these are the most personal of devices - they're the ones we carry with us everywhere we go. They're the ones we should have the greatest level of privacy with, and instead they have the lowest fundamental security for the user. Even in hackable phones, you often have to "ask permission" from the manufacturer to unlock the bootloader.
Granted, I don't think low level exploitation is something that most people need to worry about. It seems like whatever backdoors may be in there are kept very well guarded and seldom exploited - rather, they'll exploit the apps you use first. But apps have so many security holes it's almost comical.
The NSO's Pegasus toolkit infiltrated Android phones by sending a WhatsApp call. Through this, they were able to gain full access to the phone in a zero-click exploit. I'm sure there was a bit more nuance to it, but ultimately they expoited privilege WhatsApp had that it really, really shouldn't have had. WhatsApp patched the exploit, not Android (although I suspect maybe it had something to do with hidden Facebook system apps that manufacturers bundle, outside the Google Play Store).
TL;DR Don't run any apps unless you have to, or you particularly feel like you can trust them. FOSS is a good start, in particular popular FOSS apps where you can be reasonably sure that someone else is checking the code for their own benefit.