The new iPhone 17 model supports Apple’s AI tools, features faster wireless charging, and includes the new C1X modem developed by the company’s silicon team.
It’s really tough when I keep pointing out that your examples are not recent, and you continue to double down. Huawei p40 came out 2020 which is over half a decade ago. I repeatedly pointd out that you do not have any recent examples. Yet, you just keep providing more old models. I really don’t know what else to say here.
This is not a chip either, it’s a phone that isn’t in production anymore. It was succeeded by p50 which was then succeeded by Pura 90. So, if your best example, is a device that’s no longer in production, then you clearly need to retract your claim.
As you must obviously know, harmonyos and hyper have also been evolving since those devices were released just like android and ios have.
To sum up. You’ve provided zero evidence that any phones from Huawei or Xiaomi that are actually in production have vulnerabilities. And your argument that the that older devices have notes on them does not mean newer devices are not supported equally applies to iphone and pixel.
You have failed to provide any evidence to support your assertions, yet you just won’t retract them. This is frankly bizarre.
I literally just pointed out that while there is a note about a four year old device on the 2025 leak, there is also brute force support listed for socs that came out just a couple of months before the documents date.
I pointed it out in the post you just replied to.
My assertion is that pixels, graphene and iphones are safest against the hardware/software tools the police have. I’m using leaks of the capabilities of those tools to back that assertion up. While a leak from 2024 or 2025 might not have phones from 2026 on it, it provides a really clear picture of the capabilities of the police at those points in time.
I don’t think saying “look, there’s evidence that pixels, graphene and ios were best at foiling the cops a year ago and a couple years ago and five years ago and ten years ago, it stands to reason the same situation is true now” is all that contentious.
In lieu of actually having access to that software database to look up specific devices and os versions, which neither one of us have, the leaks seem like a pretty solid basis upon which to establish an understanding of police capabilities. The alternative that you’re proposing is literally assumptions.
So what would convince you of my point? It’s vanishingly unlikely that they’ll be a leak soon that will let us talk about the current latest and greatest, but would a leak that claims the ability to brute force a phone that was new back when the leak is dated be convincing to you? Do you need explicit model numbers or is just the chipset/family enough?
So, to recap, you have not provided any source that suggests modern Chinese devices that are in production today are vulnerable, or any less secure than ios or android. The brute force support is not for the new devices according to your link. It’s for the older devices. I specifically screenshotted the relevant text in the last reply. The fact that a old device could be brute forced does not extend to the argument that new device can. There is no logical reason to suggest that.
Your assertion that pixels, graphene and iphones are safest against the hardware/software tools the police have is not backed by facts. The capabilities of these toolkits DO NOT back up your assertion because they do not show that CURRENT devices are more vulnerable.
There is nothing that would convince me of your point because your point is not based on facts available to us. It’s based on your assertion that android and ios are more secure which is not supported by evidence available. If you were to provide concrete proof that these devices that are currently on sale are vulnerable, then we could have a discussion about that https://consumer.huawei.com/en/phones/
And given that there is no evidence available to suggest that Chinese devices are more vulnerable, then the next question to ask is which vendor is more likely to be compromised. The answer there is obviously that it would be the American vendor.
If you were to provide concrete proof that these devices that are currently on sale are vulnerable, then we could have a discussion about that https://consumer.huawei.com/en/phones/
The xiaomi 15 ultra that was released in February of last year and still in current production and offered new (and at new prices!) uses the explicitly claimed as brute forceable qualcomm snapdragon 8 elite.
You asked for huawei though, and their most recent stuff like the mate 80 pro and whatnot runs the kirin 9xxx chips. Kirin chips have historically been considered pretty trash security wise, but a lot of that is from people’s experiences with the three digit families of soc from 2020 and before. they’re supposed to be getting better since the 8xxx and 9xxx series. Still, the 2025 leak table 2 states “Huawei (Kirin/Qualcomm/MTK)” are partly brute forceable in cold state and fully brute forceable in hot state. Considering the 8xxx and 9xxx chips had been out last year at the time of the tables publication and the way that pixel devices are treated in that same table (big red “not supported” X mark actually means sometimes it’s supported depending on the precise version and what you’re trying to accomplish) I think it’s safe to say that by 2025 there was compromise on the 8xxx or 9xxx Kirin chips out there at that time.
Which would of course encompass the x6 and p60s listed in huaweis current lineup.
Remember though that I’m not claiming these leaks represent the extent of le capability today, but the extent of their capability then. Over time we can expect (and can see based n the expansion of their claims and the capabilities asserted in their leaks over time!) that they would get access to new methods of compromising phones, we just can’t know the exact extent until something leaks.
Again, I am trying to show an evidence based analysis as opposed to the one you’re suggesting that relies on assumptions. There’s nothing wrong with the way you’re looking at the world, but when actual evidence is present those ideas have to be examined and maybe even changed to accurately reflect the reality we see.
Phone security analysis with Chinese characteristics lol.
I think it’s safe to say that by 2025 there was compromise on the 8xxx or 9xxx Kirin chips out there at that time.
No, it’s not to safe that at all. You’re making a really wild jump here. It’s like saying that if old version of chips iPhone uses were vulnerable we could say that current ones are. You are firmly into speculation territory here. I don’t know why it’s so hard for you to just admit that your thesis is not supported by evidence.
Remember though that I’m not claiming these leaks represent the extent of le capability today, but the extent of their capability then. Over time we can expect (and can see based n the expansion of their claims and the capabilities asserted in their leaks over time!) that they would get access to new methods of compromising phones, we just can’t know the exact extent until something leaks.
Except this equally applies to American phones, and in addition to that, there is a risk of intentional backdoors. So, to reiterate for the tenth time now, American phones are just as likely to be vulnerable to malicious attackers, and on top of that they are produced by companies directly working with US and Israel making it likely they would have intentional backdoors. That’s a strictly worse scenario.
Again, the evidence speaks directly against your analysis. You’re trying to contort the evidence here to fit your narrative instead of looking at it objectively.
Phone security with burgerland characterisitcs lol.
It’s really tough when I keep pointing out that your examples are not recent, and you continue to double down. Huawei p40 came out 2020 which is over half a decade ago. I repeatedly pointd out that you do not have any recent examples. Yet, you just keep providing more old models. I really don’t know what else to say here.
This is not a chip either, it’s a phone that isn’t in production anymore. It was succeeded by p50 which was then succeeded by Pura 90. So, if your best example, is a device that’s no longer in production, then you clearly need to retract your claim.
As you must obviously know, harmonyos and hyper have also been evolving since those devices were released just like android and ios have.
To sum up. You’ve provided zero evidence that any phones from Huawei or Xiaomi that are actually in production have vulnerabilities. And your argument that the that older devices have notes on them does not mean newer devices are not supported equally applies to iphone and pixel.
You have failed to provide any evidence to support your assertions, yet you just won’t retract them. This is frankly bizarre.
I literally just pointed out that while there is a note about a four year old device on the 2025 leak, there is also brute force support listed for socs that came out just a couple of months before the documents date.
I pointed it out in the post you just replied to.
My assertion is that pixels, graphene and iphones are safest against the hardware/software tools the police have. I’m using leaks of the capabilities of those tools to back that assertion up. While a leak from 2024 or 2025 might not have phones from 2026 on it, it provides a really clear picture of the capabilities of the police at those points in time.
I don’t think saying “look, there’s evidence that pixels, graphene and ios were best at foiling the cops a year ago and a couple years ago and five years ago and ten years ago, it stands to reason the same situation is true now” is all that contentious.
In lieu of actually having access to that software database to look up specific devices and os versions, which neither one of us have, the leaks seem like a pretty solid basis upon which to establish an understanding of police capabilities. The alternative that you’re proposing is literally assumptions.
So what would convince you of my point? It’s vanishingly unlikely that they’ll be a leak soon that will let us talk about the current latest and greatest, but would a leak that claims the ability to brute force a phone that was new back when the leak is dated be convincing to you? Do you need explicit model numbers or is just the chipset/family enough?
So, to recap, you have not provided any source that suggests modern Chinese devices that are in production today are vulnerable, or any less secure than ios or android. The brute force support is not for the new devices according to your link. It’s for the older devices. I specifically screenshotted the relevant text in the last reply. The fact that a old device could be brute forced does not extend to the argument that new device can. There is no logical reason to suggest that.
Your assertion that pixels, graphene and iphones are safest against the hardware/software tools the police have is not backed by facts. The capabilities of these toolkits DO NOT back up your assertion because they do not show that CURRENT devices are more vulnerable.
There is nothing that would convince me of your point because your point is not based on facts available to us. It’s based on your assertion that android and ios are more secure which is not supported by evidence available. If you were to provide concrete proof that these devices that are currently on sale are vulnerable, then we could have a discussion about that https://consumer.huawei.com/en/phones/
And given that there is no evidence available to suggest that Chinese devices are more vulnerable, then the next question to ask is which vendor is more likely to be compromised. The answer there is obviously that it would be the American vendor.
The xiaomi 15 ultra that was released in February of last year and still in current production and offered new (and at new prices!) uses the explicitly claimed as brute forceable qualcomm snapdragon 8 elite.
You asked for huawei though, and their most recent stuff like the mate 80 pro and whatnot runs the kirin 9xxx chips. Kirin chips have historically been considered pretty trash security wise, but a lot of that is from people’s experiences with the three digit families of soc from 2020 and before. they’re supposed to be getting better since the 8xxx and 9xxx series. Still, the 2025 leak table 2 states “Huawei (Kirin/Qualcomm/MTK)” are partly brute forceable in cold state and fully brute forceable in hot state. Considering the 8xxx and 9xxx chips had been out last year at the time of the tables publication and the way that pixel devices are treated in that same table (big red “not supported” X mark actually means sometimes it’s supported depending on the precise version and what you’re trying to accomplish) I think it’s safe to say that by 2025 there was compromise on the 8xxx or 9xxx Kirin chips out there at that time.
Which would of course encompass the x6 and p60s listed in huaweis current lineup.
Remember though that I’m not claiming these leaks represent the extent of le capability today, but the extent of their capability then. Over time we can expect (and can see based n the expansion of their claims and the capabilities asserted in their leaks over time!) that they would get access to new methods of compromising phones, we just can’t know the exact extent until something leaks.
Again, I am trying to show an evidence based analysis as opposed to the one you’re suggesting that relies on assumptions. There’s nothing wrong with the way you’re looking at the world, but when actual evidence is present those ideas have to be examined and maybe even changed to accurately reflect the reality we see.
Phone security analysis with Chinese characteristics lol.
No, it’s not to safe that at all. You’re making a really wild jump here. It’s like saying that if old version of chips iPhone uses were vulnerable we could say that current ones are. You are firmly into speculation territory here. I don’t know why it’s so hard for you to just admit that your thesis is not supported by evidence.
Except this equally applies to American phones, and in addition to that, there is a risk of intentional backdoors. So, to reiterate for the tenth time now, American phones are just as likely to be vulnerable to malicious attackers, and on top of that they are produced by companies directly working with US and Israel making it likely they would have intentional backdoors. That’s a strictly worse scenario.
Again, the evidence speaks directly against your analysis. You’re trying to contort the evidence here to fit your narrative instead of looking at it objectively.
Phone security with burgerland characterisitcs lol.