4

Has replaceable battery, ARM64 architecture, sim card slot, USB OTG support, sd card slot, uab type c and no front camera. Ships to europe. Also, I don't want most of the budget to go for the camera.

minimum: • decent charging and internet send/recieve speed • multi-touch • android 8 or 9 • no annoying bloatware and restrictions (unless can be disabled with ADB) • 2gb ram (1gb free average or less) • 16gb storage (max 8gb system usage) • 60hz refresh rate • 16:9 aspect ratio • screen that can be dimmed to very very dark • can emulate nds games at 50-60fps • very long battery life (8 hours wih airplane mode off) • Runs well 8 years

you are viewing a single comment's thread
view the rest of the comments
[-] monkey011@lemmy.world -1 points 1 year ago

Explain how my phone can get hacked then

[-] zysarus@lemmy.world -1 points 1 year ago

There are literally hundreds of security vulnerabilities in Android 8 and 9.

https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/version_id-564242/Google-Android-8.0.html

Several of which allow remote code execution (meaning if exploited, attacker would have full control of your device, likely without you knowing). These vulnerabilities can be exploited a number of different ways, for example, this one would just require that your Bluetooth radio is turned on- https://www.cvedetails.com/cve/CVE-2021-0316/

This one just requires that you open a text message an attacker sends you- https://www.cvedetails.com/cve/CVE-2020-8899/

This one just requires NFC on your device to be on (which most phones have and is usually on by default) https://www.cvedetails.com/cve/CVE-2020-0073/

Don't run old OSes. 90% of the reason new versions come out is to fix these issues.

[-] monkey011@lemmy.world -2 points 1 year ago

Thanks for the effort but i still prefer non-bloated OSes with less data collection. I don't see anyone complaining about their device being remotely hijacked outside the internet.

[-] zysarus@lemmy.world 2 points 1 year ago* (last edited 1 year ago)

Many of these exploits don't require that the person using the phone even knows they're in use bud. You do you, but know that your phone will likely be hijacked to be used as a crypto miner at best. At worst literally all your data will be exfiltrated.

this post was submitted on 27 Jun 2023
4 points (83.3% liked)

Android

27862 readers
16 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

!android@lemmy.ml


founded 1 year ago
MODERATORS