I’m looking to get a custom ROM that has good compatibility with my device. Would you recommend /e/? I couldn’t find a tutorial on how to install it with Linux but I don’t think it should be that hard to figure out.
I’m looking to get a custom ROM that has good compatibility with my device. Would you recommend /e/? I couldn’t find a tutorial on how to install it with Linux but I don’t think it should be that hard to figure out.
So you actually inspect the source code of everything you use?
This whole line of reasoning really only works if you have the expertise to understand the code in the first place. Otherwise you are just shifting trust from what the company tells you to what a third party looking at the source tells you. Sometimes that works but its in no way fool proof.
There is open source malware. FOSS /= trustworthy the same as closed source /= not trustworthy.
If you don’t trust Apple that fine. Some people won’t ever use a Pixel because they don’t trust Google. It doesn’t change the fact that Google currently makes the most secure, hardware wise, consumer smart phone. The point being this shift in trust is more of a personal choice then a good privacy or security practice. Just as using something like e/os or lineage over iOS is.
No, of course I don’t. I am not as paranoid as Richard Stallman, but I am also not as pronoid as the average human to just use proprietary software when there are similarly functioning open source software. With open source software, you can inspect the code and compile the code that you inspected. This is not true for something like iOS.
And of course, FOSS malware also exists (for example the recent xz data compression program). But guess what? You can find if it is really malware or not because you ultimately can inspect the code and compile the code you inspected. That is also why the malware in xz was found out. Who knows what there is in closed source software you can’t inspect the code of. Do you perhaps believe in security through obscurity?
Using open source software is always an advantage. Praise for privacy software should be earned through the ability to verify them, and not granted by default.