Quote from: A on May 05, 2023, 23:50:20And what holes are those?
Don't play dumb. There are no less holes in Linux than in Windows. Everything is on the Internet. Take the trouble to find - if you don't want to - these are your personal problems.
Quote from: A on May 05, 2023, 23:50:20And so you know how linux kernel works is there is stable LTS branch and mainline branch. Most use the stable LTS branch and backport security fixes to older LTS kernels. So there is no need to audit everything at once.
There are no stable branches. This is all a scam.
Quote from: A on May 05, 2023, 23:50:20Many are as easy if not easier than windows
Why hasn't "free" Linux conquered the market among individuals so far? =)
Quote from: A on May 05, 2023, 23:50:20What you are describing is configuration of a firewall.
Again you pretend to be a simpleton and a fool, but this number will not work with me. Security is main key for any OS. There is no security in any version of Linux - this is a direct hole in the Internet into which any software climbs, by default, whatever it wants.
No flexibly customizable firewall with a convenient UI - no security. The goals of creating Linux were 100% - Not security.
Quote from: A on May 05, 2023, 23:50:20The real reason is because most oems have never even offered linux in the first place. People just use wherever they are given.
Again lies of the sectarian of the Lynx camp.
I bought a Dell G5 with Ubuntu LTS. Despite the fact that I'm a IT pro, I killed it OS in the layman mode in exactly 3 hours of settings, moreover, with the setting that OS herself suggested to me as a hint... After that, just followed the format of the disk and the installation of W10. =)
Quote from: A on May 05, 2023, 23:50:20Android is no different than many forms of Linux distros. Android would be like RedHat and SUSE. And AOSP would be like Fedora/Centos and OpenSuse.
And they are all full of holes. There can be no question of any security there for a private person. =)
Quote from: A on May 05, 2023, 23:50:20It is there, any app that access the internet needs network permission, it is just not configurable by default. But not sure how it is relevant.
And now you are stupidly and brazenly lying, conducting a dialogue with a professional. There is no protection from Wi-Fi access, system component access, etc. There is no integrity checking and no permission to run components individually and no expert mode. Even over the cellular network, protection is not complete, which is clearly proven by traffic leaks on Android on the second SIM, on which the traffic is paid. In all versions without exception.
Everything is done intentionally so that smartphones are an ideal device for stealing owners' data and tracking them by TNCs and the state.
And small companies that, in the same USA, are trying to make really secure firmware with p2p traffic encryption - are illegally persecuted by bandits on behalf of the US state (stationary bandits and organized organized criminal groups) on far-fetched pretexts, which clearly proves the criminal state of affairs with the security of the owners of most smartphones in the world. All this is done in such a vein INTENTIONALLY.
Quote from: A on May 05, 2023, 23:50:20Not sure how any of this is relevant to linux itself. Linux/BSD are open source, as long as you don't violate the license you are free to do whatever you wish with it. Be it make a secure distro or insecure one.
I already asked a rhetorical question earlier (the answer is obvious to an adequate person so that the sectarians do not try to object) - how many people in the world are able to conduct a full audit of each new release (this must be done MANDATORY) of the current Android kernel and all of its system software? How long will it take for an audit, even for someone who understands this at the highest level?
How many companies actually post the source code of their firmware without violating the terms of GPL2/3 by hiding part of the code?
How many hardware drivers are in the source code? In reality, a minority.
Why should I repeat this if I have to deal with inadequate sectarians?
Quote from: A on May 05, 2023, 23:50:20But even without that, as long as you stick to open source apps you can insure nothing is sent. You don't even have to audit the entire code. Just see if there is out traffic and then search in the source code the connection point.
Why in this mean and dirty world should I trust anyone?
Most are simply forced to agree to the conditions that are imposed on them. In an alternative scenario - they just become outcasts (at best case). And at worst case, as shown above, if they try to fight, they are declared as criminals by scoundrels from TNCs and the goverments.
That is why Windows, despite the fact that it is paid (although more than 60% of the world's population did not formally buy the rights to it, but in reality the mark-up for it is skillfully included in the cost of final goods at all stages of development), continues to be used by the majority of the world's population. Strange right? For some reason, people stubbornly refuse "open source" and more "safe" software, as crazy sectarians will assure - most of which are not even able to assemble OS/Soft from part of the available source code and less than 0.0001% of them are able to conduct a full audit of the code even in older versions...