• Limonene@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 hours ago

    need to charge it in a public space? You better hope no one had modified the charger with something like an RPI to silently exploit your phone

    Any secure Android device should be starting each USB session in device mode, set to charge only. It is usually not possible to change this mode without unlocking the screen. I don’t know what this has to do with sandboxing or unlocked bootloaders.

    Crossing a border into a country and they suspect you’re some sort of threat?

    How does this attack work? Are you saying they’d replace the operating system by using the unlocked bootloader? There are plenty of ways to prevent this with full disk encryption. Of course you need to check for modifications when you get it back, but that’s true even if you have a locked bootloader, because of hardware modifications and leaked keys.

    Not running software that updates the hardware’s proprietary software drivers? One text message and you’ve got a rootkit.

    In any of the open source Android distros, like LineageOS or GrapheneOS, those updates come as part of the operating system. The updater is open source, and doesn’t care whether your bootloader is locked. I assume a Linux Mobile system would be closer to Debian’s Apt system, which is also an open source updater than can install proprietary drivers, and also doesn’t care if your bootloader is locked.

    didn’t really need an “um ackshually” about people who don’t want a secure os

    This is pointlessly condescending.