Android
DROID DOES
Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
Rules
1. All posts must be relevant to Android devices/operating system.
2. Posts cannot be illegal or NSFW material.
3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.
4. Non-whitelisted bots will be banned.
5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.
6. Memes are not allowed to be posts, but are allowed in the comments.
7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.
8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.
Community Resources:
We are Android girls*,
In our Lemmy.world.
The back is plastic,
It's fantastic.
*Well, not just girls: people of all gender identities are welcomed here.
Our Partner Communities:
view the rest of the comments
My point is, when the NSA and US intelligence had essentially full access to Huawei's infrastructure and private documents, as shown in the leak in 2014, they could not produce the smoking gun that that proves Huawei had allowed the Chinese government any kind of backdoor access, nor did they claim that until 6 years later, and again, without any presentable evidence despite full access to Huawei's internal infrastructure besides "take our word for it", so forgive me for doubting the Trump administration's honesty during the middle of the US-China trade war.
I'm not saying that the backdoor doesn't exist, but I would like to see evidence, logs or leaks that proves unauthorized access, before making any kind of conclusion, otherwise, it is all just conjecture and not "have been caught having them in their devices.”
Otherwise, remember the Bloomberg story on the "spy chip" on the Supermicro motherboard a few years back? To date, nobody has ever produced examples of a Supermicro motherboard with this "spy chip" after years, but Bloomberg has never retracted that story as far as I know.
So erring on the side of caution is wrong? I should go out and buy a $200 phone with the same specs as a $1200 phone and just think I got a great deal? C'mon, bud.