Has replaceable battery, ARM64 architecture, sim card slot, USB OTG support, sd card slot, uab type c and no front camera. Ships to europe. Also, I don’t want most of the budget to go for the camera.

minimum: • decent charging and internet send/recieve speed • multi-touch • android 8 or 9 • no annoying bloatware and restrictions (unless can be disabled with ADB) • 2gb ram (1gb free average or less) • 16gb storage (max 8gb system usage) • 60hz refresh rate • 16:9 aspect ratio • screen that can be dimmed to very very dark • can emulate nds games at 50-60fps • very long battery life (8 hours wih airplane mode off) • Runs well 8 years

  • @monkey011OP
    link
    -41 year ago

    Explain how my phone can get hacked then

    • @zysarus
      link
      11 year ago

      There are literally hundreds of security vulnerabilities in Android 8 and 9.

      https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/version_id-564242/Google-Android-8.0.html

      Several of which allow remote code execution (meaning if exploited, attacker would have full control of your device, likely without you knowing). These vulnerabilities can be exploited a number of different ways, for example, this one would just require that your Bluetooth radio is turned on- https://www.cvedetails.com/cve/CVE-2021-0316/

      This one just requires that you open a text message an attacker sends you- https://www.cvedetails.com/cve/CVE-2020-8899/

      This one just requires NFC on your device to be on (which most phones have and is usually on by default) https://www.cvedetails.com/cve/CVE-2020-0073/

      Don’t run old OSes. 90% of the reason new versions come out is to fix these issues.

      • @monkey011OP
        link
        -11 year ago

        Thanks for the effort but i still prefer non-bloated OSes with less data collection. I don’t see anyone complaining about their device being remotely hijacked outside the internet.

        • @zysarus
          link
          2
          edit-2
          1 year ago

          Many of these exploits don’t require that the person using the phone even knows they’re in use bud. You do you, but know that your phone will likely be hijacked to be used as a crypto miner at best. At worst literally all your data will be exfiltrated.