Then try to fake a SHA256 checksum and you'll see that is truly impossible.
Then try to fake a SHA256 checksum and you'll see that is truly impossible.
Physical security is the only real security.Damn straight. A paper and pencil will never run out of batteries, and there isn't a script kiddie in the world that can hack a locked filing cabinet. No one can drain your accounts if there isn't money in them, and they can't steal your identity if you don't have an online presence.
That's what the WW2 Nazis and Japanese encoders thought. Didn't work out too well...Then try to fake a SHA256 checksum and you'll see that is truly impossible.
Grab a paper and your pencil and start calculating the checksum yourself. The encoders would certainly have used better code back then if a modern PC had been around.That's what the WW2 Nazis and Japanese encoders thought. Didn't work out too well...
As I mentioned earlier, I have a lot of respect and appreciation for the honest developers here who have helped make the Android experience so much better.but with managers such as Magisk, it's not possible for a process to get root permissions unless you specifically authorize it, unless there's a huge back door in your kernel.
We don't really give up freedom on an Android phone. It is extremely versatile in stock form too!
Is there any reliable entity auditing the codes continuously?
Was that a choice or just the times you grew up in?I grew up without smartphones, I didn't have a cell phone until I was 18, and it was just a flip phone.
I have read somewhere that a country's military and intelligence services have access to tools and technologies that are anywhere between 10 to 20 years ahead of what is commercially available or even known.Grab a paper and your pencil and start calculating the checksum yourself. The encoders would certainly have used better code back then if a modern PC had been around.
Grab a paper and your pencil and start calculating the checksum yourself. The encoders would certainly have used better code back then if a modern PC had been around.
Both
I think the Enigma code was cracked long before the first one was obtained.Btw 256 bit encryption is ridiculously secure. 2 (binary) to the power of 256 = 115792089237316195423570985008687907853269984665640564039457584007913129639936 possibilities. You can't brute force that in a million years with all the computing power on the planet combined. That's why breaches rarely involve breaking encryption, but rather "social" methods to gain the key (password) used for the encryption. You can't break into the connection between a user and their bank, but you can pretend to be their bank and obtain their credentials.
The reason we were able to break German encryption was because we captured critical components such as the Enigma machine. We basically got lucky. The Japanese used poor encryption that made it easy to recognize patterns and cycles.
Both
An independent "source-code-reviewer"? No. Are there generally people who do this with other source code?
Yes, that's right. But you are facing this dilemma also in the Play Store, Microsoft Store, Amazon App Store, and a few others.I can release a malware and keep the code open source. There is a good chance a lot of damage would be done before anyone finds it.
That's not a SHA256 checksum.Btw 256 bit encryption is ridiculously secure. 2 (binary) to the power of 256 = 115792089237316195423570985008687907853269984665640564039457584007913129639936 possibilities
Of course it's not a checksum. I said exactly what it is. That's the number of possible combinations of a 256 bit binary string.
Yet people place too much reliance on open source projects. Everyone thinks someone else would have checked it but in reality no one would have bothered.An independent "source-code-reviewer"? No. Are there generally people who do this with other source code?
Atleast they have a vetting process in place that will likely pick something up. With apps and mods that don't list in these stores, they are pretty much free to do what they want. Being open source isn't synonymous to being secure. That is a false presumption.But you are facing this dilemma also in the Play Store, Microsoft Store, Amazon App Store, and a few others.
Had mobile back in 1989.I mean, if that's the life you want. I grew up without smartphones, I didn't have a cell phone until I was 18, and it was just a flip phone. I'm the kind of person who would love to live off grid in the mountains somewhere so my phone is a helpful tool, not a replacement for managing my own life.
Damn straight. A paper and pencil will never run out of batteries, and there isn't a script kiddie in the world that can hack a locked filing cabinet. No one can drain your accounts if there isn't money in them, and they can't steal your identity if you don't have an online presence.Had mobile back in 1989.
Didn't own a computer until I was 45.
Didn't own a smartphone until I 54.
Crystal knowledge is a lot more useful than the internet; the internet only supplements it. In real time emergencies trying to think with your smartphone will leave you KIA. Keeping separation from the real world and the smartphone is essential when out and about.