• monovergent 🛠️@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    14 hours ago

    Common vulnerabilities: Tracking by carrier, including cell tower triangulation, SMS, and call logs.

    Non-smartphone specific vulnerabilities: Lack of security updates. However, the data to be exfiltrated from a non-smartphone is limited. If it’s only call logs and text messages, everything’s already compromised by virtue of the carrier. So the level of concern will vary with your threat model.

    Smartphone-specific vulnerabilities: Tracking by apps, manufacturer, OS vendor, or just about anything that can take advantage of the smartphone’s computing power. More data to be exfiltrated if it falls to a security vulnerability.

    Smartphone-specific advantages: Can be run Wi-Fi only to avoid tracking by carrier.