@wolnoscwkieszeni @Andres4NY Thank you so much for sharing your perspective! Youโre absolutely rightโI should avoid generalizations, especially when discussing something as nuanced as security. The debate between mobile systems and traditional computers is full of important nuances, and it really depends on the context, threat model, and specific use case.
GrapheneOS is indeed a standout in the mobile security space, and I deeply respect the work thatโs gone into making it a privacy-focused, hardened version of Android. That said, mobile devices inherently come with unique challenges. For example, modern smartphones are packed with sensorsโGPS, accelerometers, microphones, cameras, and cellular modemsโthat create a broad attack surface. While GrapheneOS does an excellent job mitigating software-level risks, it canโt fully control the hardware or low-level drivers, which can still introduce vulnerabilities. Even something as seemingly innocuous as a SIM card can become an attack vector, often operating outside the OSโs visibility.
On the other hand, traditional computersโespecially those running security-oriented Linux distributionsโoffer more flexibility in reducing that attack surface. For instance, you can build a highly secure workstation by combining 'Qubes OS' (with its powerful compartmentalization) and an open-source bootloader like 'Coreboot' to replace proprietary firmware. This setup allows you to physically disable or remove unnecessary sensors and components, something thatโs far harder to do on a mobile device. Distributions like 'Tails' (for amnesic, privacy-focused use) or 'Qubes OS' (for isolation) demonstrate just how secure a Linux-based system can be when tailored for high-risk environments.
One of the biggest advantages of traditional computers is transparency: open hardware and drivers (while still not perfect) are generally more accessible and auditable than the closed ecosystems of most mobile devices. If you donโt need GPS, a microphone, or a cellular modem, you can simply omit them from your build. Try doing that with a smartphone!
Of course, security is never one-size-fits-all. Without a shared framework or threat model, itโs tough to declare one system definitively "more secure" than another. Different scenarios demand different solutions. For my part, I avoid using mobile phones for sensitive data entirely, simply because the risks associated with mobile networks and hardware-level vulnerabilities feel too significant. (Iโm also fortunate enough not to rely on smartphones, so Iโll admit my perspective might be a bit biasedโthough Iโm always open to learning more!)
Speaking of learning: Do you know of a reliable way to test GrapheneOS in a virtual machine? Iโd love to get a hands-on impression of its capabilities and limitationsโitโs always great to explore these tools firsthand!
Thanks again for the insightful discussionโIโm always eager to dive deeper into these topics!