Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>But on my Linux machines, I'm arguably in control.

How so?

If you show up at the border and the agent demands you install the software or your machine will be confiscated and you will be denied entry, then they are just as much in control as they are with android. At current all systems seem vulnerable to this attack that shares something in spirit with rubber hose cryptography.

Even Apple could be, but I suspect it is a case of it not being worth the effort since androids are the majority of phones.



I wasn't talking about border crossing.

Anyone paying attention knows that it's foolish to take sensitive devices and data across borders.

I was talking about what stuff I can install on my gear.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: