diff --git a/blog/foss_is_working_against_itself.html b/blog/foss_is_working_against_itself.html index a75f405..cf3b9b4 100644 --- a/blog/foss_is_working_against_itself.html +++ b/blog/foss_is_working_against_itself.html @@ -5,7 +5,7 @@ - + @@ -52,15 +52,15 @@ in this post as the "Free and Open Source (FOSS) movement". With that stated, I will now debunk the misinformation being spread inside of this extremely flawed movement.
The - FOSS + FOSS movement is an attempt to regain - privacy + privacy and - control + control over our devices and data, but the entire concept of FOSS-only, at the current time, is severely, and dangerously, flawed. What the FOSS community does not seem to understand is the fact that most FOSS software cares not about - security. + security. "Security"; keep that word in mind as you progress through this article. What is security? Security is being safe and secure from adversaries and unwanted consequences; security protects our rights and allows us to protect ourselves. Without security, we have no protection, and without protection, @@ -68,12 +68,12 @@ FOSS movement is seeking.
FOSS projects rarely take security into account; they simply look at the surface level, rather than the actual - root cause + root cause of the issues they are attempting to fight against. In this case, the focus is on privacy and control. Without security mechanisms to protect the privacy features and the ability to control your devices and data, it can be stripped away as if it never existed in the first place, which, inevitably, leads us back to the beginning, and the cycle repeats. With this - ideology, + ideology, privacy and control will *never* be achieved. There is no foundation to build privacy or control upon. It is impossible to build a solid, freedom respecting platform on this model.
@@ -82,40 +82,40 @@A FOSS phone, especially so-called - "Linux phones" + "Linux phones" are completely detrimental to privacy and control, because they do not have the security necessary to enforce that privacy. - Unlocked bootloaders + Unlocked bootloaders prevent the device from - verifying the integrity of the boot chain, + verifying the integrity of the boot chain, including the OS, meaning any adversary, whether a stranger who happens to pick up the device, or a big tech or government entity, can simply inject malicious code into your software and you wouldn't have any idea it was there. If that's not enough of a backdoor for you to reconsider your position, how about the trivial - evil maid + evil maid and data extraction attacks which could be executed on your device, without coercion? With Android phones, this is bad enough to completely break the privacy and control the FOSS movement seeks, but "Linux phones" take it a step further by implementing barely any security, if any at all. - Privilege escalation + Privilege escalation is trivial to achieve on any Linux system, which is the reason Linux - hardening + hardening strategies often include restricting access to the root account; if you - root your Android phone, + root your Android phone, or use a "Linux phone", you've already destroyed the security model, and thus privacy and control model you were attempting to achieve. Not only are these side effects of FOSS, so is the absolutely illogical restriction of not being able to, or making it unnecessarily difficult to, install and update critical components of the system, such as proprietary - firmware, + firmware, which just so happens to be almost all of them. "Linux phones" are not as free as they proclaim to be.
You may ask "What's so bad about using - LineageOS?", + LineageOS?", to which I answer with "What's not bad about it?".
LineageOS is not the only Android OS (commonly, and incorrectly, referred to as a "ROM") with such issues, but it is one of the worst. The only things such insecure OSes can provide you are @@ -142,25 +142,25 @@ fact, and evidence, not emotion, which is a difficult pill for most people to swallow. Use your adversaries' weapons against them. The only way to effectively combat the privacy invasion and lack of control of our devices and data is to become a - renegade + renegade and not take sides. Yes, that means not taking sides with the closed source, proprietary, big tech and government entities, but it also means not taking sides with any FOSS entities. The only way to win this war is to take *whatever* hardware and software you can, and use it tactically.
The only solution for phone security, privacy, and control, is to use a Google Pixel (currently, Pixel 4a-series or newer) running - GrapheneOS. + GrapheneOS. Google Pixel phones allow you complete bootloader freedom, including the - ability to lock the bootloader after flashing a custom OS + ability to lock the bootloader after flashing a custom OS (GrapheneOS includes a custom OS signing key to allow locking the bootloader and enabling verified boot to prevent - malware + malware persistence, evil maid attacks, and boot chain - corruption), - long device support lifecycles + corruption), + long device support lifecycles (minimum 3 years for Pixel 4a-series to Pixel 5a, minimum 5 years for Pixel 6-series and newer), and - guaranteed monthly security updates + guaranteed monthly security updates for the entire support timeframe of the devices.