top | item 18871185

(no title)

Digital-Citizen | 7 years ago

I don't know what Librem 5 will offer in the end, but I think your response argues a false dichotomy with zero evidence. There is no "automated transparent and trusted global support infrastructure [...that requires] zero user interaction" for anything and (given how we improve things in real life) apparently such a thing is unnecessary. If you want to know how something works, you either learn how it works and do the vetting & improvement yourself, or get someone you trust to do this work on your behalf. Computer hardware and software is no different. The question is whether you're allowed to do this work at all, whether it's possible for you to hand someone you have good reason to trust the device and software to do this vetting for you.

There are many good reasons not to trust Apple or any proprietor. You claim an iPhone is "the most secure hardware and software combination you can get" but you offer no evidence to let us understand how you arrive at that conclusion. Proprietary software (such as iPhone's default OS, iOS) is untrustworthy by default because nobody but the proprietor has permission to inspect the software's source code, alter the software to fix problems or improve the software, or help the community by distributing improved software. You don't have the freedoms of free software (running, modifying, sharing published computer software including commercially). So in order to estimate Apple's trustworthiness we can't examine the thing itself in the most reasonable and thorough way. We have to fall back on something else such as Apple's reputation and consider how they treat their users. Apple left years-old remotely-exploitable security bugs in programs thus leaving users vulnerable (see http://www.telegraph.co.uk/technology/apple/8912714/Apple-iT... or https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-... for details). When it comes to iOS issues things are no better: iOS is the prototype of a software jail (hence the term "jailbreaking" to liberate one's device, and thus the user, from such control). Apple can and regularly does extract data from iPhones to give to the state (per http://arstechnica.com/apple/2014/05/new-guidelines-outline-...) and Apple's claimed security improvements rely on software users can't vet, improve, or share. https://www.gnu.org/proprietary/malware-apple.html has lots of examples of various kinds of Apple proprietary malware many examples include software iPhone users run. Apple also works against letting users get fixes without going through Apple, slows down iPhones users won't "upgrade", and disallows using older versions of iOS or non-iOS operating systems (because why let users control their computers).

This is all par for the course with proprietors; proprietary software (nonfree software, software that doesn't respect a user's freedom and community) is often malware (software designed to mistreat its users). The worst part is that because these programs are proprietary, motivated and knowledgeable users are not permitted to vet, improve, or distribute software that could benefit themselves and the entire community.

discuss

order

No comments yet.