<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: TommyTran732</title><link>https://news.ycombinator.com/user?id=TommyTran732</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 10:20:16 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=TommyTran732" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>> what Purism is doing is moving the non-auditable part of the OS onto a separate storage device so that they can claim that the OS is "Fully Auditable" and FSF certified even though the non-auditable and non-free part is mounted into the OS filesystem during boot.<p>Yup, that's part of it.<p>But remember, even if they didn't do it, there's still a matter of them by using components with internal flash storage for the firmware instead of shipping firmware with the OS and letting the OS upload them. Like that's not a hackjob like the /lib/firmware or /run/firmware stuff or anything, but it's not like it's any more "open" than any other system, if not being a bit more opague. Of course the marketing would still be deceptive then.</p>
]]></description><pubDate>Thu, 30 Apr 2026 03:26:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47957720</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47957720</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47957720</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>> I see no effort from your side to come to some understanding or to clarify anything.<p>Accusing me of your own sins.<p>> What do you mean by "tampering" here? Is uploading firmware to peripherals a "tampering"? Why is this a problem, compared with other devices? Does anybof those blobs run on the CPU? I don't understand what you are trying to say.<p>On the laptop, messing with the system memory (/run) and dumping firmware packages in there instead of just shipping it with the OS using a sensible approach like the linux-firmware package is a hack-job and nasty practice. And since it's messing with system memory, that's your "tampering" right there.<p>On the phone, once again, instead of using a normal, sensible approach like the linux-firmware package on desktop Linux or the vendor partition on Android, they just store the firmware in some chip, then have the OS (or more accurately, the initramfs) mount the content of the chip using overlayfs in /lib/firmware anyways. It's another implementation of the same hackjob. That, and they combine it with using peripherals whose firmware are stored inside of internal flash chips so the OS doesn't have to be shipped with firmware packages that it then needs to load into the peripherals.<p>What does this entire exercise do for freedom or openness? *Asbolutely nothing*. It's called shuffling the firmware storage around so you can market the OS as "blob free" when it's literally meaningless. If anything, it makes it harder to audit and figure out which firmware version is being run than if the firmware were to be shipped along with the OS.<p>---<p>To dumb it down a notch if you really do not understand what I am trying to say:<p>This makes about as much sense as if I were to take the SSD out of my laptop, destroy the M.2 socket, then advertise it as a "storage free and OS free laptop". To use the laptop, you must plug in external storage through the USB port and load up an OS. But hey, since there is no SSD or OS on the "main" part of the laptop, I am now qualified for some made up certification and can advertise my stuff as "freeing" the user from the shackles of the evil storage system and nastiness of having an OS. Definitely more "open" than other laptops.</p>
]]></description><pubDate>Thu, 30 Apr 2026 01:01:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47956777</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47956777</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47956777</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>Yeah, why are you selectively reading? This is after he admitted what I said was true. His only contention is that he thinks it's hard to know what the PCR values should be to fake, so he calls that "security". You are being extra ordinarily disingenuous here.<p>The actual admission (requires a login): <a href="https://forum.qubes-os.org/t/how-exactly-is-heads-pureboot-secure/23092/3" rel="nofollow">https://forum.qubes-os.org/t/how-exactly-is-heads-pureboot-s...</a><p>His words, not mine:<p>> The goal of Heads is to bring reasonably trustworthy firmware on reasonably open platforms to boot reasonably secure OS, enforcing best effort user controlled atteststion, compartmentalization and prevention. Never is it written anywhere that the firmware is tampering resistant or tampering proof: we lack open source implementation in hardware to have root of trust in hardware. Heads is best approach on what is available, the anchor of trust being in the bootblock, not in hardware. The chain of trust lies there. Of course an evil maid could craft a firmware that would lie about its measurements in the bootblock, raminit, romstage and the payload. But as today, no PoC has even been made public, showing it being actoinnable, and by nature of TPM extend operations is nothing easy to realize, while possible.<p>I am just gonna highlight the critical part here one more time, since I sent you the same thing before and you didn't read:<p>> *Of course an evil maid could craft a firmware that would lie about its measurements in the bootblock, raminit, romstage and the payload.*<p>Yeah, I wouldn't call heads "best approach on what is available" and I do think Boot Guard is better, but at least he is honest about the actual mechanism and the very obvious attack vector.</p>
]]></description><pubDate>Wed, 29 Apr 2026 20:36:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954230</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47954230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954230</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>Why do you copy paste the same thing over and over a bunch of times? Linking to an irrelevant post doesn't change how it works.<p>Read the code posted above.</p>
]]></description><pubDate>Wed, 29 Apr 2026 20:24:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954070</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47954070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954070</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>Since you copy pasta your response, I will link to my other comment and do a bit of copy pasta here:<p><a href="https://news.ycombinator.com/item?id=47953726">https://news.ycombinator.com/item?id=47953726</a><p>It is exactly how it works. Read the actual code for yourself:
<a href="https://source.puri.sm/Librem5/librem5-fw-jail/-/blob/pureos/byzantium/usr/share/initramfs-tools/scripts/local-bottom/librem5-mount-fw-jail?ref_type=heads" rel="nofollow">https://source.puri.sm/Librem5/librem5-fw-jail/-/blob/pureos...</a><p>If you can't read code, here is the marketing material:
<a href="https://puri.sm/posts/shipping-new-sparklan-wifi-cards-with-librem-5/" rel="nofollow">https://puri.sm/posts/shipping-new-sparklan-wifi-cards-with-...</a><p>If you don't know that the firmware for components/peripherals can either be uploaded to them by Linux or just stored on some flash chip on the component, read:
<a href="https://www.chromium.org/chromium-os/developer-library/reference/security/firmware-updating/" rel="nofollow">https://www.chromium.org/chromium-os/developer-library/refer...</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 20:22:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47954053</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47954053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47954053</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>Because it's true, and I know what he said, I am not confused at all. Did you not read anything at all?<p>On the Librem laptop, the tampering is done by PureBoot and inject into /run/firmware. The other user was linking the stuff with the laptop.<p>*On a Librem 5, it is stored on a separate chip, then they read it with the initramfs, then mount it on top of the regular filesystem at /lib/firmware*.<p>Like I said, it's just shuffling stuff around.<p>Here is the actual code, if you care enough to read it:
<a href="https://source.puri.sm/Librem5/librem5-fw-jail/-/blob/pureos/byzantium/usr/share/initramfs-tools/scripts/local-bottom/librem5-mount-fw-jail?ref_type=heads" rel="nofollow">https://source.puri.sm/Librem5/librem5-fw-jail/-/blob/pureos...</a><p>If you can't read code, here is the marketing material:
<a href="https://puri.sm/posts/shipping-new-sparklan-wifi-cards-with-librem-5/" rel="nofollow">https://puri.sm/posts/shipping-new-sparklan-wifi-cards-with-...</a><p>If you don't know that the firmware for components/peripherals can either be uploaded to them by Linux or just stored on some flash chip on the component, read:
<a href="https://www.chromium.org/chromium-os/developer-library/reference/security/firmware-updating/" rel="nofollow">https://www.chromium.org/chromium-os/developer-library/refer...</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 19:59:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47953726</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47953726</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47953726</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>It's basically taking the blobs that would be normally shipped with the OS in a sensible manner, shuffle it around, then calling it "free" while the same blobs would still be there, just on different flash storage chips.</p>
]]></description><pubDate>Wed, 29 Apr 2026 15:56:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47950194</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47950194</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47950194</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>The SOC still has firmware baked in as per usual.<p>And the firmware for Bluetooth/Wifi is loaded in by having the initramfs read it from the NOR flash, mount it in /lib/firmware, then it is business as usual like a desktop Linux distribution.<p>It's not something special. It's just a hackjob. They shuffle the files around and made it much harder to update.<p><a href="https://source.puri.sm/Librem5/librem5-fw-jail/-/blob/pureos/byzantium/usr/share/initramfs-tools/scripts/local-bottom/librem5-mount-fw-jail?ref_type=heads" rel="nofollow">https://source.puri.sm/Librem5/librem5-fw-jail/-/blob/pureos...</a><p><a href="https://puri.sm/posts/shipping-new-sparklan-wifi-cards-with-librem-5/" rel="nofollow">https://puri.sm/posts/shipping-new-sparklan-wifi-cards-with-...</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 15:47:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47950063</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47950063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47950063</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>> It's just physically impossible to defend from tracking, when the phone has networking connections on. Not even on all-mighty GrapheneOS.<p>I can use GrapheneOS with the global mic toggled off and sensors toggled off/denied to apps. I can still text, browse the internet, and check my emails while talking to my friends. I can go about my day, receive notifications, be a productive member of society while being reasonably sure that no apps on my phone is snooping on my convos.<p>This is what most people expect of a "microphone killswitch". Unfortunately, the hardware killswitches on the Librem cannot provide even remotely the same level of assurances as even a software killswitch.<p>The Librem 5 is either fully offline or something can snoop on the convos while internet is on. How is that a sensible implementation?<p>> I am using a phone with the kill switches off in a meaningful manner all the time. It is a full computer running a desktop OS and can run any apps, including listening to music from a microSD card, reading saved text/pdf files, showing presentations with original LibreOffice, programming in any language with standard tools, and so on.<p>Yeah, I am sure this is what a sane person expects a functioning phone with a "microphone killswitch" to be - an offline pocket sized computer instead of a device for communication 99% of the time.<p>> Even though the phone in the lockdown mode (with all three kill switches off) has no connections, if I'm ever in emergency and need some help, I can turn the phone functionality back on and call for the help I need. Obviously, privacy in such case would be secondary after health.<p>Yes, I am sure the purpose of the phone is to make a call instead of being used for texting/receiving notifications when you are out and about.<p>> Unlike for GrapheneOS, there is no way to hack my kill switches for any money. I can be 100% certain that they work as intended, even if a state actor is against me. Yes, everything else might be compromised in such case but not the tracking and listening to me when I need true location and microphone privacy.<p>Ever considered that maybe, just maybe, a valid use case for most people is not necessarily to hide their location from the carriers 24/7 but to not have their private conversation snooped on?<p>Or perhaps, another valid use case that some people might want is the ability to be connected to the internet via Wifi while not having their location tracked by the carrier or their private conversations snooped on? I can give you another detailed explanation as to how standard Android has a location toggle that works while your desktop-Linux-in-a-phone can easily have the location tracked when Wifi is on (and without an OS compromise) if you'd like ;)</p>
]]></description><pubDate>Wed, 29 Apr 2026 15:29:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47949803</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47949803</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47949803</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>The developer of Heads admitted that if someone tampers with the boot block and falsifies the measurements Heads cannot protect the device right on the Qubes forum. Why won't you listen to him then? Is he not trustworthy enough for you?</p>
]]></description><pubDate>Wed, 29 Apr 2026 15:14:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47949589</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47949589</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47949589</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>Which blobs are running on the Librem 5 CPU? Which blobs are running on GrapheneOS CPU?<p>Both the Pixel and Librem 5 have firmware baked into the SoC that is executed.<p>On GrapheneOS, the firmware is signed and updated along with the OS.<p>On the Librem 5, the firmware for Wifi/Bluetooth is stored on a NOR chip, which is read from and mounted into the OS by the initramfs into /lib/firmware.<p>Not-withstanding the above, Librem 5 components such as the USB controller, touch screen controller, radios, battery, etc simply have closed-source firmware baked in (stored on some flash chip on these components), but it doesn't mean that they are not there or in use.<p>In both cases, components either do not get proper firmware updates from the OS, or they are too old/low quality to get any firmware updates from the vendors to begin with. Storing firmware on the component is also a less secure approach than having signed firmware loaded by the OS, as it now means that these components have persistent storage which can be attacked.<p>Aside from all of the above, they also use a dedicated CPU core to run firmware blobs for things like memory training.<p>In essence, what the Librem 5 has achieved is shuffling proprietary firmware storage around instead of eliminating their existence or execution. It is not any more "free" or "open" than anyone else while also being less secure.</p>
]]></description><pubDate>Wed, 29 Apr 2026 15:10:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47949532</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47949532</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47949532</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>Quite frankly, the whole Librem ecosystem is significantly less "open" than GrapheneOS or any desktop Linux variant to anyone who look at things objectively instead of using weird FSF semantics.<p>Instead of loading firmware in sensible manner like GrapheneOS or desktop Linux distros with the linux-firmware package, they keep PureOS "free of blobs" by having the bootloader inject all of the blobs into memory in an extremely shady manner. Since when was having the bootloader tamper with system memory about freedom and openness?<p>Oh, and they even have the audacity to market this as the "firmware jail" as if it is any more contained than the linux-firmware package too. Truly impressive stuff.</p>
]]></description><pubDate>Wed, 29 Apr 2026 12:28:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47947395</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47947395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47947395</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>> You never could answer to them.<p>I did reply to them plenty of times. Here you go doing the exact same thing again - ignoring 100% of what's being said, then claiming "no one can respond".<p>> You only talk about the lack of security of Pureboot and never showed the code breaking it.<p>If you think a piece of code is needed to understand why it's a joke, then I don't   even understand what is wrong with you. LMAO. The whole thing is conceptually botched, and they pretty much admitted as much.<p>1. Boot block performs measurements of itself, its settings and everything down the chain for attestation.<p>2. There's nothing protecting the boot block.<p>3. A malicious boot block can lie about measurements.<p>4. If the goal is to defend against an attacker who tampers with the BIOS chip - then it fails at doing so miserably because an attacker can just use a boot block that lies about the measurements.<p>Seriously, what good is showing you the code if you don't even conceptually understand how the thing works?<p>You know, there is a famous saying: A farmer does not need to know how to lay eggs to know whether an egg is good or bad. In our case, the egg is already rotten from the get-go. This is not a "Ohhh something has such bad code I can attack it using XYZ method, wait and see!" situation. This is a situation where "Your logic doesn't even make any sense to begin with."<p>Perhaps, just perhaps, you can benefit from just spending 5 minutes thinking a bit about how the whole thing actually works at a very high level and read what I said above.</p>
]]></description><pubDate>Thu, 23 Apr 2026 19:11:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47880225</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47880225</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47880225</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>Man, if this entirely thread of people calling out how ridiculous the implementation is and the killswitch not actually working in practice isn't enough to convince you, nothing ever will.<p>I don't even feel like arguing against the absurdity of your arguments anymore. This is my last attempt at dumping it down a notch:<p>A "microphone killswitch" is supposed to protect the user against having their convos being snooped on when it's toggled and still be able to use the phone in a meaningful manner. A "microphone killswitch" that doesn't really function on its own and requires turning the entire device into a brick is non-fuctional for all practical purposes.<p>I might as well just invent a "microphone killswitch" that requires people to pull out the battery to make sure that they are not snooped on at that point.</p>
]]></description><pubDate>Thu, 23 Apr 2026 19:01:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47880070</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47880070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47880070</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>Not entirely sure if the chip they are using (WM8962) can be reconfigured as a mic or not... it probably can't. But yes, the speaker is still active even when the mic is toggle off.<p>Everything else is pretty much the argument though - who buys a phone with a microphone killswitch so good that for it to actually function you must also flip the other killswitches to kill both wifi and cellular connection? A microphone killswitch so impeccable that in order for you to not be snooped on you also have to give up texting and browsing the internet. Truely impressive stuff.</p>
]]></description><pubDate>Thu, 23 Apr 2026 01:32:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47871383</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47871383</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47871383</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>Oh he's already done that when I explained to him how stuff like PureBoot has circular logic and doesn't actually work on Qubes forum already.<p>Unfortunately he will just ignore every single counter argument ever made and blindly believe these companies because their marketing material has "freedom" and "FOSS" in it.</p>
]]></description><pubDate>Thu, 23 Apr 2026 01:08:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47871229</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47871229</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47871229</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>And what good is the phone when 3 switches are off? You think that people buy a phone with a "mic killswitch" expects to have to turn off practically everything including internet to make sure that their mics aren't snooped on?<p>Does that really sound like a functioning "killswitch"?</p>
]]></description><pubDate>Wed, 22 Apr 2026 22:02:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47869879</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47869879</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47869879</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>Important to note that users only stopped getting updates, the phones were not bricked and they can reinstall the OS signed with the new key.<p>CopperheadOS was always's Micay's project and used his own signing key. The key never belonged to Copperhead the company afaik.</p>
]]></description><pubDate>Wed, 22 Apr 2026 00:01:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47856624</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47856624</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47856624</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>> Their microphone kill switch also doesn't prevent audio recording<p>It doesn't prevent audio recording in the super paranoid "oh, the whole phone has been compromised" scenario because it is bypassable via the sensors.<p>In fact, it doesn't even protect the phone in normal operation, because apps with device=all can access the sensors without the whole phone being compromised.<p>It doesn't prevent audio recording with any normal usage either because the OS is incapable of protecting private conversations thanks to the PulseAudio socket. "Exploiting" this is significantly easier than any of the stuff involving the sensors.</p>
]]></description><pubDate>Tue, 21 Apr 2026 22:41:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47855622</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47855622</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47855622</guid></item><item><title><![CDATA[New comment by TommyTran732 in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>> I said multiple times that I exclusively run trusted apps on the phone. I use Qubes for untrusted staff. Do you understand that threat models can vary?<p>By that logic, you might as well just not have the killswitch at all. Everything is magically "trusted", right?<p>Yes, I do understand that threat models can vary. Please give an example of a threat model where it makes more sense to use a phone which cannot protect any private calls over a functioning phone that has real protection.<p>If you are going to say "oh, when you never talk on the phone at all" then you might as well just remove the mic. It's not hard.<p>As usual, there is nothing that GrapheneOS or Micay says regarding the Librem or Pinephone that is inaccurate. You are just saying stuff that doesn't even remotely make any sense. Perhaps you are being deliberately disingenuous. Perhaps you are just so blinded by an ideology that you cannot see that what you say is just nonsense. I wouldn't know.<p>> I choose to dispute false information. I don't care about any personalities.<p>Doesn't seem to be what you are doing here.</p>
]]></description><pubDate>Tue, 21 Apr 2026 22:13:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47855294</link><dc:creator>TommyTran732</dc:creator><comments>https://news.ycombinator.com/item?id=47855294</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47855294</guid></item></channel></rss>