I don’t care if anyone has a Xiaomi, Oneplus, Samsung, etc. Each brand is using a modified version of Android, and they chose to be compatible with each other. But for example the “blue vs green bubble” drama is a thing specifically because of Apple locking their unsuspecting users into a closed ecosystem. And it sure isn’t Android’s fault for not being compatible with it.

The more power a company like this gains, the worse will it be for the whole industry.

  • bloodfart@lemmy.ml
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    10 months ago

    The fbi contracted a third party to defeat the limit on passcode attempts so they could brute force the lock screen by having someone just sit there trying every possible code. My understanding is that it involved physical access to the device and the way that process is handled by the phone was reengineered shortly afterwards to prevent it from happening in the future.

    That’s not a backdoor, that’s sawing the front door into pieces to avoid triggering the anti-tamper system on the hinges and lock.

    If you want backdoor worries, look to the generations of apple chips with undocumented memory mapped io registers that were in development during that time period. But don’t think too hard about how arm chips are developed or why that got left in there or how. You may come to the undeniable conclusion that a natsec cutout is licensing slabs of arm feature silicon with backdoors built in.

    This is not a defense of apple. Only a clarification that there wasn’t a backdoor found in the San bernidino phone, and that if you wanna be freaked out about back doors there’s better stuff to get crazy over.

      • bloodfart@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        10 months ago

        if youre worried about backdoors and spying, its a good idea to start paying attention to the trade publications and training media made for reprehensible spooks.

        they’ll say shit that makes you throw up in your mouth but you’ll never look at push notifications or sms the same way again.

    • Honytawk@lemmy.zip
      link
      fedilink
      arrow-up
      1
      ·
      10 months ago

      Usually, they just copy the phone into a Virtual Machine and copy the machine millions of times to try every password.