It is a poisoned gift. Does it really matter to put more defense on the entrance when the back door is wide open?

The moment you use tainted hardware with a specific operating system then you're immediately a target interesting enough to be targeted. My own preference is to blend in the noise.

Tor should NEVER be used nor endorsed by anyone serious about privacy. It was a dirty project from the beginning, the NSA leaks provided solid evidence and the shills around here just talk and pretend those docs never happened.

Reply to this note

Please Login to reply.

Discussion

tell me you don't understand open source software without telling me...

and phones have lots of attention on them, you have to actually show evidence.

not just generic "privacy is impossible" fud

One of my professional titles at some time was "Chief Expert for Open Source" for a very, very large company, so a few people tend to think I know a few things.

Nobody here will check the AOSP source code. Look at the malware injected on NPM packages that was exposed this week: it went for a long time without being noticed. You won't check either the code for that suspicious distro, so all we are left is "trust".

I won't go further to try convincing you of my perspective and I don't really care enough to look into their code to find vulnerabilities which would only be downplayed after exposed.

The red flags are there (compromised hardware, suspicious funding). My time is better used supporting alternatives without such red flags.

Is it really worth to promote (for free) such dodgy projects?