← Back to context

Comment by zepto

4 years ago

That doesn’t make the system audited. The obvious reason we don’t hear more about the weaknesses is that no high value targets are using these systems, so it’s not worth exploiting them.

Um, these distros are normally used to run like half the Internet, they are very valuable targets today and I don't think putting them on a phone changes the threat environment so much.

  • The threat environment is utterly different between an individual person’s phone and an anonymous server behind a firewall on the internet.

    It’s not even close.