And if these morons can't even detect if it's on phone level or on the server side? Uh-oh.
THere is no safe phone, except for perhaps some Linux-distro based ones (unproven). All Android/iOS/Chinese variant OSes are compromised. Plenty of proof about back doors and bypassable encryption.
the ONLY THING protecting your linux desktop is the attackers dont know what distro and version you have and you might have a different kernel or something.
Also on Linux you download most of your apps from secure repositories. That shuts down a major vector of infection on windows PCs where people commonly search for and install software from the internet. So the chances an attacker can get you to sudo install on their malware is far less (though not impossible if some software relies on a corrupt open source dependency).
Add to that the fact you have more control over the system and less random services running leaving ports exposed or creating other vulnerabilities that might be on windows. So as you implied, you have to be more important and merit the attention of a more custom tailored attack.
I think most hackers will just go for the social engineering route and get some admins password via phishing.
Well that sucks. And I have been guilty of using 3rd party repos too, sometimes you have to.
Yeah so it isn't perfect, but I trust the Linux community to fix vulnerabilities far more than Microsoft! They install shitty spyware on your PC by default! They don't care.
And other Chinese brand phones are not?
And if these morons can't even detect if it's on phone level or on the server side? Uh-oh.
THere is no safe phone, except for perhaps some Linux-distro based ones (unproven). All Android/iOS/Chinese variant OSes are compromised. Plenty of proof about back doors and bypassable encryption.
Also on Linux you download most of your apps from secure repositories. That shuts down a major vector of infection on windows PCs where people commonly search for and install software from the internet. So the chances an attacker can get you to sudo install on their malware is far less (though not impossible if some software relies on a corrupt open source dependency).
Add to that the fact you have more control over the system and less random services running leaving ports exposed or creating other vulnerabilities that might be on windows. So as you implied, you have to be more important and merit the attention of a more custom tailored attack.
I think most hackers will just go for the social engineering route and get some admins password via phishing.
Well that sucks. And I have been guilty of using 3rd party repos too, sometimes you have to.
Yeah so it isn't perfect, but I trust the Linux community to fix vulnerabilities far more than Microsoft! They install shitty spyware on your PC by default! They don't care.