This was true until Edge transitioned to Chromium. Now the natively installed browser in Windows is Chromium based.
This was true until Edge transitioned to Chromium. Now the natively installed browser in Windows is Chromium based.
Collective control does not equal you controlling it. FOSS has significant advantage on this front because if you want to you can at least go peek under the covers and see what’s happening, but unless you are running a very, very minimal system and very carefully selecting your software and very carefully inspecting every update, you have already given up your control. We all do. And I absolutely know what I’m talking about I manage thousands of systems, both windows and Linux. I work with open source and closed source software. Sometimes the closed source software is leaps and bounds ahead of FOSS. And as a business you choose what allows your business to make money within acceptable risk levels.
I’ll give you an example. There is literally no actual FOSS competitor to Exchange (on-prem) for enterprise scale email that functions even half as well. Does exchange suck for many reasons including that it’s closed source? Sure. But there’s a reason that no one has been able to put forth a reasonable competitor for businesses to adopt and use. There are certainly other options with fewer features or which require you to give up even more control of your data but none that match. So most massive scale businesses continue to choose exchange.
Bud you don’t control any of the software on your device I’d bet. FOSS or not. Even if you’re building from source, are you inspecting every line of code on every update? Are you reviewing every PR that gets merged? No, of course not.
Many of these exploits don’t require that the person using the phone even knows they’re in use bud. You do you, but know that your phone will likely be hijacked to be used as a crypto miner at best. At worst literally all your data will be exfiltrated.
There are literally hundreds of security vulnerabilities in Android 8 and 9.
Several of which allow remote code execution (meaning if exploited, attacker would have full control of your device, likely without you knowing). These vulnerabilities can be exploited a number of different ways, for example, this one would just require that your Bluetooth radio is turned on- https://www.cvedetails.com/cve/CVE-2021-0316/
This one just requires that you open a text message an attacker sends you- https://www.cvedetails.com/cve/CVE-2020-8899/
This one just requires NFC on your device to be on (which most phones have and is usually on by default) https://www.cvedetails.com/cve/CVE-2020-0073/
Don’t run old OSes. 90% of the reason new versions come out is to fix these issues.
Am I missing something? Where’s the admittance to performing cosmetic surgery on puppies?
This isn’t a browser issue, it’s an Internet issue. And it’s easily fixed on Firefox.