I’m not conveniently ignoring anything - I read the article. For them to find this out “later” would require that they didn’t understand what the fuck they were doing from the beginning.
I’m not conveniently ignoring anything - I read the article. For them to find this out “later” would require that they didn’t understand what the fuck they were doing from the beginning.
Yeah no. This article is literally incorrect from its first supposition. They suggest they have “degoogled” the phone then install microG and are surprised to find that it makes the phone ping google. Well duh, how else is microG going to allow access to Google Framework services for apps like YouTube and Gmail?
Calling these clowns researchers is like calling a kid who makes a lego house an architect.
The word you’re all looking for is sandboxing. That’s what containers are - sandboxes. And while they a different approach to VMs they do rely on some similar principals.
Do you also try to sell a secure phone by inaccurate reporting, poorly researched guesses and casting aspersions on competitors and then report all the criticisms and inaccuracies at the end of your piece without editing it?
That’s what happened here so your snark is completely off the point. Nobody expected perfection, but we do want accurate reporting and proper accountability.