I have a Pixel 4a (with Calyx) for a few years already (start of 2021) and it’s still going great. The battery is okay. Everything works nice. It’s smooth. It runs everything perfectly fine.

This makes me glad to see that hardware wise this phone was really built to last, I can’t even count how many times I dropped it so hard that I was scared to see the damage (which was always either nothing or a broken screen protector)

But software wise I’m screwed as security updates are already gone from Google and I only get the extended support from Calyx which will also end soon.

Now I’m forced to choose between having a phone that is insecure or buying a new one.

So thanks Google for the high quality hardware, but what’s up with this software planned obsolescence??

I know this isn’t exactly right to repair, but it also kind of is because if Google decided to ditch the 4a, they should be forced to open source the software so that the public can actually repair it.

I’m sure that some of their latest updates can be modified slightly to work for the 4a, but they don’t care and for them this is a win-win since they don’t have to maintian support and they get new customers who would otherwise be satisfied with an “old” phone.

What happened to the days when an old phone meant a phone that was already crumbling to pieces, and not a fully functional computer that is slightly older then a toddler?

    • MTK@lemmy.worldOP
      link
      fedilink
      arrow-up
      8
      ·
      5 months ago

      I’m sorry but you are wrong, if there is a CVE it means it works, and “could lead to” means that it literary can lead to that outcome.

      All you need it one really bad CVE or a few bad-ish ones to do a lot of damage.

            • MTK@lemmy.worldOP
              link
              fedilink
              arrow-up
              0
              ·
              5 months ago

              Look, when it comes to security statistics, a lot of it is locked behind closed doors in all kinds of big security companies. I can tell you personally that I have worked in such a company and you could see a lot of exploitation (attempts) on Android devices. It was there.

              Look once there’s a CVE and there is a POC for it. Usually there comes a Metasploit module for it and then it’s for sure being used by a bunch of people.

                • MTK@lemmy.worldOP
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  5 months ago

                  Look, I have no interest in convincing you, you can also find some materials online but yeah, plenty of this info is closed source, that’s just how it is with some industries.

                  If you want to throw caution to the wind because you couldn’t find anything that is your choice.

    • rand_alpha19@moist.catsweat.com
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      5 months ago

      It’s a vulnerability that is actively able to be exploited on any compatible system that isn’t explicitly protecting against it (i.e., any outdated phone connected to the internet).

      So a very big fucking deal in general, even if your specific phone may not be targeted. Your only defense is hoping that you’re not unlucky, which is a really shitty approach to security.

        • rand_alpha19@moist.catsweat.com
          link
          fedilink
          arrow-up
          3
          ·
          5 months ago

          I don’t really care enough to spend a lot of time searching, but I found this opinion article breaking down a severe Apple iOS vulnerability from 2019: https://www.tomsguide.com/opinion/your-iphone-is-less-safe-than-it-was-yesterday-and-thats-good

          If a device isn’t getting security updates anymore, it’s vulnerable. And a lot of the time these things aren’t caught right away. This is the exact same reason why you should never put a computer running Windows XP or 7 on the internet - it’s no longer secure and your system can be accessed by any person motivated to do so.

          If you don’t care, that’s another matter. But you’re inarguably at a higher level of risk when your system can be exploited in a greater number of ways than one with more recent security patches.

            • rand_alpha19@moist.catsweat.com
              link
              fedilink
              arrow-up
              2
              ·
              5 months ago

              If you want documented evidence that there is a nefarious cadre of organizations hacking phones en masse using high-profile exploits before you’ll believe that out of date phones are something to give a shit about, then you’ll never be “presented with an actual case.”

              What you’re describing isn’t the reason why we should care about security. If you don’t care, whatever, but planning for bad things that could happen is just basic preparedness even outside of computing. If a fire started in my apartment and I didn’t have a fire extinguisher I’d be fucked regardless of how likely I think a fire would be.

                • rand_alpha19@moist.catsweat.com
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  5 months ago

                  Okay, then you don’t care. That’s fine. There’s no mass hacking of phones going on, that’s not the risk and whoever told you that it was is stupid.

                  It’s an individualized problem, which is why it doesn’t make the news and why you’re on your own when companies fail to keep your device up to date. It’s not as sensational as a massive fire so it’s hard to care about.

                  Anyway, hopefully you’ll never have to worry about being hacked. The odds are in your favour, after all. The issue is when you get unlucky.

                  • MTK@lemmy.worldOP
                    link
                    fedilink
                    arrow-up
                    2
                    ·
                    5 months ago

                    I do want to add that there are also mass hacking of phones, they just tend to be non-disruptive to the user, so it rearly gets coverage.