Hacker Newsnew | past | comments | ask | show | jobs | submit | more normaler's commentslogin

GraphenOS offers that, since the Playstore/Google Applications are non privileged applications.

Big Plus for being easy installable from the Graphenos Appstore Applications. It currently offers 8 applications and 4 of them are GraphenOS own applications.


GrapheneOS is nice for people using Google Pixel phones. And useless for anyone else.


FWIW the Pixel 8, the newest device offering Advanced Memory Protection, sells for less than $600 brand new right now. You can tune memory tagging & hardened memory allocation on a per-app basis. It's a game changer


You are saying that as if it was cheap. I am pretty sure most people buy <$250 smartphones. That is at least the case in my social circle, very few iphones, pixel, an awful lot of cheap Xiaomi Redmi and the Samsung Galaxies are usually the A line instead of the S line.


If someone uses Xiaomi they probably also don't worry about privacy.


At least it is possible (really annoying process) to unlock the bootloader on Xiaomi devices.


Forgive my ignorance, but what is it about GrapheneOS that makes it better on Pixel devices?


It’s only available for Pixels.


Ah, that would do it!


It's due to hardware reasons just as an FYI - I forget the specifics, so forgive me if this is dated, but I believe it had to do with some crypto-specific chip if I remember right.


Yeah the proprietary blackbox security chip that they pinky promised to open source but never did...


Maybe make it into category's where more money equals more guaranteed work time unless specifically excempt due to the nature of the product, but most electronics should be able to work one year at the very least.


In germany and maybe the entire EU there is a one year mandatory time where the manufacturer has to replace/fix the item and after the replace/fix event there is another 2 months on top.


I thought it was 2 years warranty across Europe now?


Yes it's 2 years (if you are buying it as the consumer)

[1]: https://www.eccnet.eu/consumer-rights/what-are-my-consumer-r...


Thank you for the clarification


sounds like an incentive to make sure things only fail after 14 months, then


delusional every professional uses PuTTY /s


Of course they do. And what is that thing on the other side that Putty connects to for our professional friends in vast majority of cases?


...I was going to make a joke about Windows servers, but actually AFAIK Windows just uses OpenSSH for its SSH server so that kinda proves the point doesn't it?


I have been playing Pixel Dungeon and then Shattered Pixel Dungeon since ~2016.

Such a great game.


This is my current state of thought. Proprietary software perceives me as an enemy who needs to be locked out of as many features as possible to allow for more money to be extracted out of me while also investing the least amount possible back into the product. The only timeframe where proprietary software is groundbreaking and at the forefront of technology is when they have not yet captured and locked in a large market share.


I use aegis (previously i used andotp) and backup to a folder shared via syncthing. This allows me to usw OT via andotp -cli in emergency vor to use it in a new phone. For some i also use keepassxc (my credential/information store.) but the important ones. I prefer yubikeys, but keep totp AS a backup mechanism when i can add two methods.


In any company of this size there is no owner that can decide he cares about anything but money. There is no actual vision other then short and longterm shareholder value.

"Founders" like Musk and Jobs have a short window where they can move their companies in directions which matches their vision, but that closes quickly after the company goes public and their stock gets diluted enough so that they be ousted.


They can and they do. But you are missing out in revenue when they do.


This is a good reminder to give keys only to huma s and in case of e.g. backups use specific users and limit the commands this user can access on the remote machines via jails or the authorized key file.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: