• @PeterPoopshit@sh.itjust.works
    link
    fedilink
    English
    31
    edit-2
    11 months ago

    Tech paranoid all the way, although not the same type of tech paranoid as Luke Smith. The only good computer is one you have the hardware schematics to (i.e. virtually none of them). Thinkpads are just another brand of overpriced laptop. Besides the occasional steam game, I heavily prefer FOSS only and will flat out refuse almost anything that has drm. My unlocked bootloader android phone is so heavily locked down with privacy stuff that I cause Google to lose money merely by existing.

    • @LemmyNameMyself@lemmy.world
      link
      fedilink
      English
      1611 months ago

      The only good computer is one you have the hardware schematics to (i.e. virtually none of them).

      Purism, System76 and, more recently, Framework

      • Hobovision
        link
        fedilink
        1011 months ago

        What’s the point if they still have AMD, Intel, Nvidia, Qualcomm, etc. chips on them?

      • @CalcProgrammer1@lemmy.ml
        link
        fedilink
        English
        211 months ago

        PinePhone Pro for the mobile side. The schematics are available. I quite like mine, especially with the keyboard case. It’s basically a pocket laptop.

      • @mimichuu_@lemm.ee
        link
        fedilink
        English
        211 months ago

        This is only for laptops by the way. System76 desktop BIOSes are still closed source. It’s such a shame that there’s no FOSS BIOS for desktop PCs, hopefully AMD OpenSIL changes that.

          • @mimichuu_@lemm.ee
            link
            fedilink
            111 months ago

            I’m not sure they can make them FOSS because they don’t make their desktop motherboards AFAIK. They’re much harder to make than laptop ones.

    • @PeriodicallyPedantic@lemmy.ca
      link
      fedilink
      English
      611 months ago

      Assuming the schematic is for repairability, not security. Seems unlikely that enthusiasts would have the equipment to non-destructivly identify malicious deviations from spec, introduced by competent actors.