Linux
Welcome to c/linux!
Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!
Rules:
-
Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.
-
Be respectful: Treat fellow community members with respect and courtesy.
-
Quality over quantity: Share informative and thought-provoking content.
-
No spam or self-promotion: Avoid excessive self-promotion or spamming.
-
No NSFW adult content
-
Follow general lemmy guidelines.
view the rest of the comments
Great answers here, just gonna add that practically everything is hackable, it's just a question of how hard and what level of access is needed.
Sometimes to hack a device you might need to remove parts and solder in replacements, and that is already a level that is unrealistic for most.
Sometimes it's worth the trouble:
https://www.youtube.com/watch?v=dT9y-KQbqi4
I'd be willing to (mildly) disagree here. We had lots of locked bootloaders in the early days of Android. Lots have never been hacked. Same for secure boot on computers and other cryptographic means. It's more a theoretical thing if you have 2 years to spend on coding and replace half the phone with soldered parts. I'm pretty sure that level of dedication makes almost everything hackable. But in practice, we have lots of things that make it so difficult, it's never going to happen in reality.
I guess it's okay while we still have alternatives available. I mean as long as there are some hackable phones, we can just buy those.
Yeah, I agree, I guess I just didn't specify that the scale is from running a simple command all the way to needing a dedicated team with hundreds of hours and millions of dollars.
A locked bootloader from a company that did it well and will actively protect against unlocking it can be near impossible for a single person with reasonable budgets to bypass.
Yes. I'm always amazed how people constantly find ways to jailbreak Apple devices, and they're a massive company and not that bad at locking down their stuff... Or how we hacked most of the gaming consoles out there, while Nintendo/Sony/... are super incentivised to make it impossible. Sometimes it takes quite some time, but someone will find a way. Though that's a bit more common with widespread devices. Sometimes I'll try to find a privacy-respecting tablet and there isn't even a single aftermarket operating system at all for a recent model and then I'm a bit disappointed in what we can achieve as a community.
I'll add "how expensive" to the list. Sometimes you'll have to burn through devices.
Super relevant username.
Why?
https://en.wikipedia.org/wiki/MediaTek
Oh, didn't know they named a company after me, cool