Why phones are more secure than desktops
The Hated One The Hated One
431K subscribers
57,614 views
0

 Published On May 27, 2022

If you want to maximize your digital privacy and security, you should use your phone. Computer operating systems are a security nightmare!
Support independent research and analysis by joining my Patreon page:   / thehatedone  

It has been the case for years that modern phone security models allow for a much greater protection of your sensitive data than any desktop offers today. There are plenty of problems with phones, many of which are totally unethical. But any issue you can criticize a modern phone for is several times worse on a desktop equivalent of it.

Both Android and iOS were designed with a thorough threat model in mind. Modern mobile operating systems implement defense in depth mechanisms that eliminate the ability of malicious software to access your sensitive data. Much of this is done via exploit mitigation, attack surface reduction and isolation. Isolation and containment is where the differences between desktop and mobile security models are most visible to the end user.

Many zealots in the privacy community, if such a thing even exists, do not make a distinction between services and platforms. Android means a lot of completely unrelated things to a lot of different people. But in reality, Android is just a free and open source mobile operating system. It has no Google apps or services, no pre-installed bundles or bloatware.

It’s important to make this distinction, because it’s possible to use an Android device without any privacy invasive apps and services. The Android’s model allows for it.

Android is private and safe by default. It’s best if you can use it without privacy invasive services, such as the Google Play Store. This is best achieved on GrapheneOS. But even if you can’t use your phone without them, it’s not all lost. You should still go through the privacy settings of each of these services and disable all the collection you are not comfortable with.

If you are buying a phone for privacy, Pixel phones from Google or the latest generation iPhones are gonna be your best bet. Pixel phones will let you go miles further than iPhones if you decide to flash GrapheneOS on them. That way your phone will be significantly protected against even unknown vulnerabilities and 0day exploits and it will completely anonymize your device.

Sources
[1a] https://www.reuters.com/technology/ap...
[1b] https://www.nbcnews.com/tech/security...
[1c] https://www.theguardian.com/technolog...
[2] https://source.android.com/devices/te...
[3]https://developer.android.com/guide/t...
[4] https://developer.android.com/trainin...
[5] https://arxiv.org/pdf/1904.05572.pdf
[6] https://source.android.com/security/e...
[7] https://ssd.eff.org/en/module/how-enc...
[8] https://source.android.com/security/a...
[9] https://source.android.com/security/o...
[10a] https://source.android.com/security/a...
[10b] http://apps.testinsane.com/mindmaps/g...
[11] https://developer.apple.com/app-store...
[12] https://support.apple.com/en-us/HT204053
[13] https://support.google.com/accounts/a...
[14] https://developer.android.com/referen...
[15] https://source.android.com/
[16] https://grapheneos.org/usage#sandboxe...
[17] https://safety.google/intl/en_us/priv...
[18] https://grapheneos.org/features#impro...
[19] https://www.theatlantic.com/technolog...
[20] https://www.nytimes.com/2021/08/18/te...
[21] https://www.reuters.com/article/us-ap...
[22] https://www.nytimes.com/2021/05/17/te...
[23] https://support.apple.com/en-us/HT201222
[24] https://www.xda-developers.com/how-an...
[25] https://support.google.com/pixelphone...
[26] https://grapheneos.org/faq#supported-...
[27] https://source.android.com/security/b...
[28] https://www.cyberscoop.com/ios-zero-d...
[29] https://www.zerodium.com/program.html
[30] https://www.wired.com/story/android-z...

Music by: White Bat Audio [Karl Casey]
Follow me:
  / the_hatedone_  
  / thehatedone  

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

show more

Share/Embed