Ask HN: Are there any secure alternatives to iPhone?

5 points | by smk_ 10 days ago

6 comments

  • RicoElectrico 10 days ago
    In your threat model take into consideration that there was a "secure phone" sold with an IM app that turned out to be backdoored by the author in cooperation with FBI.

    https://arstechnica.com/tech-policy/2021/06/fbi-sold-phones-...

    • gtvwill 10 days ago
      Choice of device is mostly useless. They're all the same re. Security. Which is to say their only as good as the jurisdiction their being sold/used in. And given the laws Australia has implemented, if a company sells their product here or has operations registered in Australia you can't guarantee it hasn't been backdoored.
      • tentacleuno 8 days ago
        > And given the laws Australia has implemented, if a company sells their product here or has operations registered in Australia you can't guarantee it hasn't been backdoored.

        Could you elaborate on this? I haven't heard anything about a new law allowing installing backdoors on devices mid-transit, although I would not be surprised.

      • shaicoleman 10 days ago
        Security is only as good as the weakest link. Each company that touches the phone or the software increases the attack surface.

        Therefore, from a security perspective, the phones with the best security are the iPhones and the Google Pixel phones. They also generally have the quickest security updates.

        If you install a custom ROM (e.g. LineageOS), you can make almost any phone reasonably secure, but that involves a lot of time and hassle. If you don't trust Apple/Google, that's probably your best option.

        An alternative approach is to have a second device for security sensitive purposes, which can be locked-down, only essential apps installed, offline by default, etc.

        • tentacleuno 8 days ago
          > f you install a custom ROM (e.g. LineageOS), you can make almost any phone reasonably secure

          Do the official LineageOS releases have Verified Boot (allow you to lock the bootloader)? Everything I've tried uses userdebug keys, which is pretty bad security-wise, and requires an unlocked bootloader.

          I ask because Verified Boot ensures the root of trust is there in the binaries. If they're wrong by one bit, the OS won't boot.

          Realistically, even if your OS has additionally security features compared to AOSP, it'd still be like building a house out of obsidian, then putting a wooden barn door on it.

        • tentacleuno 8 days ago
          > Security is only as good as the weakest link. Each company that touches the phone or the software increases the attack surface.

          Didn't Librem try to work around this? I think they sealed it before transport, and used nail polish to ensure the device had not been tampered with in transit.

        • yuppie_scum 10 days ago
          Seriously consider a risk-based approach to your security posture.
          • feisar 9 days ago
            use the pixel 4a and put graphine OS on it

            https://graphineos.org

          • brenda1996 9 days ago
            yes you can select from one-plus phone
            • tentacleuno 8 days ago
              Could you give more information? Why OnePlus in particular?