Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Also, didn't the Supreme Court rule that cell phones, which are connected to the internet, require a warrant, which indicates that there is a certain expectation of privacy? Of course, there's no real difference between a smart phone and a computer.


Smart phones are locked down, harder to hack, and as such might have a greater expectation.

Note that the judge cited the Apple-FBI story:

>Tor users likewise cannot reasonably expect to be safe from hackers. Even if Tor users hope that the Tor network will keep certain information private -just as terrorists seem to expect Apple to keep their data private - it is unreasonable not to expect that someone will be able to gain access


How are smart phones harder to hack? they've been information goldmines for years. java vulnerabilities, bluetooth vulnerabilities, even vulnerabilities from the charging cable.

Are they just perceived to be less vulnerable?


iPhones in particular require all user code that runs to be signed and run in a sandbox, which makes it much harder to hack.

Android also has a sandbox, but is more permissive about running things outside it: still, by default it's pretty locked down.

Windows is not locked down that way, and most programs will require admin access for installation, at least.


Regarding android, the latest Qualcomm debacle (FDE is broken) shows that it's not a very safe platform. Add in the google services that store information unencrypted (which nerfs Signal and other "safe" apps), and you have a owned phone.

iPhone's walled garden is, as John Oliver stated, akin to "dancing on the edge of a volcano"; only safe until the next vulnerability arrives. Don't forget that every iOS other than current has been jailbroken/rooted.

Thankfully, Windows Phone is a joke that is being phased out, so we don't have to laugh uncomfortably at it anymore.


You're conflating remote vulnerabilities, which is what I referred to above, with local vulnerabilities.


Really feels like there is an axe to grind here.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: