WelcomeWelcome | FAQFAQ | DownloadsDownloads | WikiWiki

Author Topic: Linux and Smartphones OS  (Read 31378 times)

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #15 on: March 16, 2022, 04:30:29 AM »
Purism Librem 5 First Impression - Russell Coker

https://etbe.coker.com.au/2022/03/15/librem-5-first-impression/

sharing is caring
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #16 on: March 19, 2022, 03:07:21 AM »
more from Russell Coker on the Purism Librem 5

https://etbe.coker.com.au/2022/03/19/more-librem5/

sharing is caring
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline mocore

  • Hero Member
  • *****
  • Posts: 725
  • ~.~
Re: Linux and Smartphones OS
« Reply #17 on: May 24, 2022, 10:30:21 PM »

+


https://sxmo.org/
sxmo - minimalistic phone environment which uses suckless tools

via : https://suckless.org/other_projects/

chairing is despairing  :P

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #18 on: May 25, 2022, 05:14:15 AM »
re: sxmo

also see:
https://man.sr.ht/~anjan/sxmo-docs-stable/

and:
https://media.lrdu.org/sxmo_pinephone_demos/

keywords:
smartphone
pinephone
suckless
android
iphone
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #19 on: October 15, 2022, 11:40:11 AM »
this thread was one of the results from a forum search for "iphone"...so why not...

https://www.macrumors.com/2022/10/13/ios-16-vpns-leak-data-even-with-lockdown-mode/
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html


Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #23 on: November 21, 2022, 06:21:26 AM »
stumbled across:
https://odysee.com/@rossmanngrouplive:9/a-preview-of-the-futo-open-to-the-public:2
which led to:
https://odysee.com/@rossmanngrouplive:9/grapheneos-after-a-week-this-is-my-new:c
and naturally:
https://grapheneos.org/
storied history:
https://grapheneos.org/history/

also this may be of interest:
https://infosec.exchange/@DanielMicay

one more:
https://infosec.exchange/@grapheneos/109350842304790165

keyword(s):
graphene
copperhead
androidhardening

20221121-0528am-cdt-usa-modified-added Mastodon link
20221121-0541am-cdt-usa-modified-added another Mastodon link
« Last Edit: November 21, 2022, 06:41:44 AM by gadget42 »
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Online patrikg

  • Wiki Author
  • Hero Member
  • *****
  • Posts: 767
Re: Linux and Smartphones OS
« Reply #24 on: November 21, 2022, 07:06:42 AM »
Something strange here, that Louis don't release this video on his main channel on youtube ??
I am very big fan of what Louis do for the community, regarding the repair problem and the problem with locked in.

Thx for letting me know that he also post some videos on odysee.com.


Offline mocore

  • Hero Member
  • *****
  • Posts: 725
  • ~.~

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #27 on: November 25, 2022, 03:40:48 AM »
Google says Google and other Android manufacturers haven't patched security flaws

Millions of phones with Mali GPUs are at risk from exploits months after ARM issued a fix, Project Zero suggests.

https://www.engadget.com/google-arm-android-phones-security-flaw-mali-gpu-samsung-oppo-xiaomi-183029261.html
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
Re: Linux and Smartphones OS
« Reply #28 on: November 28, 2022, 08:19:57 AM »
crazy that just a few days ago posted this:

simpler times perhaps?
https://en.wikipedia.org/wiki/2600:_The_Hacker_Quarterly

HQ2600:
https://www.2600.com/
...

and here is a current commentary referencing phone-phreaking:
https://opensource.com/article/22/11/open-source-payphone-philtel
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 914
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html