I think it assumes spyware that is capable of defeating / deceiving the operating system. This requires either manufacturer support or undisclosed vulnerabilities, which spyware makers always try to buy and keep secret.
Given the complexity of mobile operating systems these days, I’m pretty sure they cannot be secure - but answering the question of “which one is easiest to break” is beyond my competence.
Invididually - my laptop’s camera is taped over from the beginning. My activist phone doesn’t have a camera, and the battery comes out easily. My ordinary phone is obsolete in every way, but the replacement will have switches for enabling / disabling the camera, microphone, cellular modem, bluetooth and wifi.
I think it assumes spyware that is capable of defeating / deceiving the operating system. This requires either manufacturer support or undisclosed vulnerabilities, which spyware makers always try to buy and keep secret.
Given the complexity of mobile operating systems these days, I’m pretty sure they cannot be secure - but answering the question of “which one is easiest to break” is beyond my competence.
Invididually - my laptop’s camera is taped over from the beginning. My activist phone doesn’t have a camera, and the battery comes out easily. My ordinary phone is obsolete in every way, but the replacement will have switches for enabling / disabling the camera, microphone, cellular modem, bluetooth and wifi.
DIY or have my dreams come true and there really is something like this on the market???