What exactly are you looking for? Android IS Linux, do you want to try a different “distribution” just for fun?
Admin of lm.put.tf, there isn’t anything special there, just an instance for friends.
What exactly are you looking for? Android IS Linux, do you want to try a different “distribution” just for fun?
The code is still accessible, you just can’t use the code search function in the web, which normal git doesn’t have anyway.
The latest pixel devices (since 6 I think?) already provide accees to a /dev/kvm
device, so maybe you could even run a normal Ubuntu server VM on your phone for hosting these services.
Are you sure the content is gone? I assume the communities had users from other servers, if so isn’t the content replicated on other servers?
I guess he means that raspberry pi doesn’t run a mainline kernel
deleted by creator
deleted by creator
I think the admin of c/selfhosted is the admin of Lemmy.world
Made my own for myself and some friends. We couldn’t be bothered creating account on the larger instances and have power tripping admins de-federating instances over trivial issues.
I think bitwarden fills all of your requirements.
I ran GrapheneOS on a pixel 5 but ultimately went back to stock.
GrapheneOS was considerably slower on my phone. Apps took a bit longer to loader, but the worst was installing APKs, it takes so much longer compared to stock. Some apps (e.g. revolut) took more than 5 minutes to install, it was crazy.
I’d know if someone had any access to my phone
This is really a bold claim. How or why makes you so sure of that?
If the attacker/app manages to get some application running in the background as root, how would you know that they had access to your phone?
Am I naïve for thinking that manufacturers stopping support for devices, then claiming it affects your safety, is just to sell more phones?
Yes you are.
Vulnerabilities are constantly being found in the software stack used by Android, if you are running vulnerable software you’re increasing the likelihood of some malicious app (or website, file, etc…) taking advantage of the vulnerability. The consequences of vulnerability vary from being able to fingerprint your device when it’s not supposed, to escalateling privileges to root or even kernel mode. Although the later are significantly rarer.
and had zero security issues in a dozen years
That you know of… If the vulnerability is successfully exploited, the likelihood of you noticing are close to zero.
You could always flash a custom ROM to install the latest security patches, but you would still be missing the security updates for all the closed source components (such as the bootloader, device drivers, etc…). Not to mention all the security implications (good or bad) that comes with installing custom ROMs.
What kind of “control” do you mean? Your posts/comments get replicated across all the other instances. You can’t really “guarantee” a delete, since the other instances might just ignore your request for delete.
Wouldn’t unlocking the bootloader and installing a custom ROM be easier, more stable and cheaper than buying a niche product that’s unlikely to work properly?