>>105955732>Strawmanning again, I see.you really like to use that word where it's not appropriate
>Micay never claimed absolute guaranteed securityhave you not read my post, at all? I mean you have to be a retard to not see the point here.
saying that you heavily focus on preventing unknown vulnerabilities with paranthesising the 0-day like as if it's not enough to just tell 'unknown', messages that you really give a shit about security. And without any constraint stated in the same sentence, it means they have a high risk threat model. It's deceiving the end user at best. They seem to be so serious about this project and go into endless discussions online over the tiniest slightest untruths but yet they omit their actual threat model on their website and say they are against 0-day vulns as a whole. Bullshit.
>And even if someone would break the secure element (if by magic encryption keys for root of trust or a backdoor or a security vulnerability) that helps very little. Because decryption keys are not stored in plain text, but derived using your passphrase/PIN. In a high-level threat model you use a strong passphrase and turn off your phone whenever not in use. So they can exploit the OS and hardware all they want, they won't get your data without the passphrase.I don't know what kind of retarded thing you heard from them but this is not true. The manufacturer of the platform has total control over it. They can unlock your bootloader remotely (like Xiaomi do in request). The hardware is secure vault only against you and not against them.
>Because decryption keys are not stored in plain text, but derived using your passphrase/PIN.wtf? holy shit. Did you enter your (unexisting) passphrase the first time you bought your phone so that it could verify its firmware and bootloader? Actually try to learn how things work at that level like firmware and bootblock integrity