Don’t care at all about dynamic lock screens. Actively want to keep AI out of my phone, maybe excepting specific apps. Battery tech by itself is nice but you know that stronger batteries will just result in even power hungrier phones, so no real good will come of it. Hinged phones break more and cost more.
NTN (satellite text messaging for when you have no cell coverage) is the main interesting phone tech to appear recently IMHO. Everything else is just little tweaks or outright regressions. I prefer more repairability and openness to more features by now.
I think everyone likes to glue down batteries now because that helps the phone’s drop protection. The adhesive strips aren’t so bad since you can heat them a little / use a spudger to get the battery out. It’s worse when they make it very hard to get to the battery, or make you unglue delicate parts like the screen. You are probably right to be pessimistic though.
Check ifixit before you buy a phone, to make sure diy battery replacement is not too difficult. Then you don’t have to worry as much. Just figure on a swap or two during the phone’s lifetime.
Other than that, keep charge level between 20% and 80% as someone said. But I think in that range, it’s ok to fast charge within reason.
Supposedly starting in 2027, all phones sold in EU will have user replaceable batteries.
There is a famous Erik Naggum rant about XML at, no wait, I better not link it but you can find it with a search engine if you want, which means you don’t get to complain to me about it since you are the one who went looking for it. Very NSFW and VERY politically incorrect. Naggum died in 2009 but anyone who published a thing like that today would be raked over the coals.
Nobody intentionally creates vulnerabilities, but more complicated software is more error prone and therefore more likely to be vulnerable. Fast release cycles also get in the way of good testing. The most complicated piece of software on most phones is the web browser, and its complexity is imposed by the web and its advertisements, rather than by what the user wants or needs.
IOS and Android face pretty much the same issues on the OS developer and phone manufacturer sides. Therefore, the IOS and Android worlds could both clean up their acts in about the same way if the incentives were right. That they don’t do so might be a bad situation that we have to cope with, but we shouldn’t pretend that it is a good situation.
I wonder what apps require IOS 16 in some meaningful way. I know there is a situation with Android apps requiring OS upgrades unnecessarily.
Why do companies like McDonalds want you to run an app anyway, instead of e.g. using a web page? There are a few sites or products where I currently give up the equivalent of a french-fry discount rather than run their stupid app. It’s just a minor annoyance so far, but it doesn’t make sense to me. Do those apps usuallly keep running the background so they can track you, or what?
Those security vulnerabililties are because of buggy old software, and updating the software in the old devices does as good a job of fixing the vulnerabilities as selling you a new device does. A significant e-waste tax on every new device, accompanied by credits for keeping old devices working, might help with that. Anyway, if it’s an app (rather than OS) vulnerability and you can’t fix it with an update because the new version of the app requires a new OS, that’s mostly likely an app that you don’t need to use. I’m getting by ok with F-droid apps instead of Play Store apps, for example.
Best still would be to debug the software before shipping it, so it wouldn’t have those vulnerabilities in the first place. There are various forces that get in the way of that, but a significant one is that web development is now driven by delivering more advertising rather than useful information to the user.
The laptop (Thinkpad X220) that I’m using is much older than the iphone 7 and it runs current Debian just fine. Lots of people are running current LineageOS on similarly old Android phones. Why can’t the phone vendors do the same? Planned obsolescence doesn’t change by wrapping it with nice marketing words.
I have figured that if I needed to get an iphone for some reason, it would be a 6+, since that is the last version with a headphone jack (similarly for Pixels, it would be a 4A). But I guess that strategy won’t work any more.
Reed to T’Pol: “I was always rather fond of the name Stinky”.
Idk about took off but it was a successful product by reasonable standards. I have a few of them and chose it for a product that ended up going nowhere. That was partly because of hardware add-ons available for the pico but not for comparable boards. The existence of that 3rd party hardware ecosystem itself shows that the pico did ok.
I would say the documentation is more thorough, and at least for the non-wireless versions, there are no mysterious code blobs. The source code to everything including the ROM boot loader is online. The Pico boards also have a nice voltage regulation system so you can run them on a wide range of supply voltages.
It was $5 but was limited to one per customer (in practice, one per order) at the usual vendors, and became very scarce at the time other pi models did. The wireless version was $10. They later eliminated the non-wireless version, bumped the wireless version to $15, and introduced a new fancier model (Pi Zero 2) that is also $15.
That’s more like an old school raspberry pi (runs Linux etc), not like a Pico. I didn’t know about that specific version but variants of the Beagleboard and Beaglebone have been around forever (longer than the raspberry pi). They are better than the rpi in some ways, and at least some of them are more open, but Rpi knocked the rug out from under them in cost and performance. I wouldn’t be so sure of the security of the wireless Pico either.
They exist. I use several. Lowendspirit.com (about cheap vps for self hosting) is one. I’m not active there right now but have been at various times.
Chapter from “Security Engineering” (2nd ed) about physical tamper resistance:
https://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c16.pdf
It’s been ages since I read it so idr how much of it was at chip level. Really high end stuff have the secure chips in a tamper reactive enclosure so it’s difficult to get to them without first erasing the contents. The chapter discusses that ;).
Every company tries to get people to use personal phones. It takes some gumption to refuse.