I’m looking to get a custom ROM that has good compatibility with my device. Would you recommend /e/? I couldn’t find a tutorial on how to install it with Linux but I don’t think it should be that hard to figure out.

    • Imprint9816@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      5
      ·
      edit-2
      2 days ago

      That’s idiotic. Your data being insecure is inherently not private.

      They are two sides of the same coin.

        • Imprint9816@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          21 hours ago

          Not necessarily, there are tons of things that are very secure but not at all private.

          But… having a massive attack surface and known security issues and thinking your data is somehow private because you use a FOSS application is silly.

          EDIT to answer your edit: partly. I mean regular timely security updates seems to be a struggle for most of these android OS but also because it provides a bunch of privacy by default options that these other android ROMs don’t such as a private relay, default RCS messaging, and makes them easy for users.

          • asudox@lemmy.asudox.dev
            link
            fedilink
            arrow-up
            1
            ·
            21 hours ago

            You do have a good point. However, I can’t consider a proprietary operating system like iOS truly private. It may be secure (certainly more so than stock Android and some random custom Android based ones) but if I can’t be sure that my operating system isn’t spying on me, then security alone doesn’t matter much for me tbh. Apple’s operating systems are no exception to this.

            So, in a ranking that considers both security AND privacy, iOS being the second one is questionable. However, if the ranking is based solely on security, then I have no issue with it.

              • asudox@lemmy.asudox.dev
                link
                fedilink
                arrow-up
                1
                ·
                12 hours ago

                sigh

                My evidence is something being proprietary and in the hands of big tech (in this case Apple). What makes you blindly trust in Apple’s words?

                • Imprint9816@lemmy.dbzer0.com
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  edit-2
                  4 hours ago

                  I didn’t like my tone in my last response so I apologize.

                  Something being propriety isn’t evidence of anything nefarious nor is something being from a large company. That’s not evidence at all.

                  I’m not trusting Apples word, the privacy feature examples I’ve mentioned are proven working methods. Unless you have some source showing that RCS or their private relay don’t work in someway.

                  • asudox@lemmy.asudox.dev
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    edit-2
                    4 hours ago

                    I don’t know about you but if I don’t know what a program that I can’t inspect the code of does, I’ll just assume the worst case scenario. I can’t prove it but you also can’t prove that it isn’t doing something shady, can you? So what if I am using Private Relay? Apple will know what websites I visit or what I do with my phone as long as I use their proprietary operating system and who knows who they’ll give it to. And with this, I am saying it again: Apple’s operating systems are no exception to this rule.