• PeterPoopshit@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    16
    ·
    edit-2
    1 year ago

    Tech paranoid all the way, although not the same type of tech paranoid as Luke Smith. The only good computer is one you have the hardware schematics to (i.e. virtually none of them). Thinkpads are just another brand of overpriced laptop. Besides the occasional steam game, I heavily prefer FOSS only and will flat out refuse almost anything that has drm. My unlocked bootloader android phone is so heavily locked down with privacy stuff that I cause Google to lose money merely by existing.

    • LemmyNameMyself@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      1 year ago

      The only good computer is one you have the hardware schematics to (i.e. virtually none of them).

      Purism, System76 and, more recently, Framework

      • mimichuu_@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        This is only for laptops by the way. System76 desktop BIOSes are still closed source. It’s such a shame that there’s no FOSS BIOS for desktop PCs, hopefully AMD OpenSIL changes that.

          • mimichuu_@lemm.ee
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            I’m not sure they can make them FOSS because they don’t make their desktop motherboards AFAIK. They’re much harder to make than laptop ones.

      • CalcProgrammer1@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        PinePhone Pro for the mobile side. The schematics are available. I quite like mine, especially with the keyboard case. It’s basically a pocket laptop.

    • PeriodicallyPedantic@lemmy.ca
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      Assuming the schematic is for repairability, not security. Seems unlikely that enthusiasts would have the equipment to non-destructivly identify malicious deviations from spec, introduced by competent actors.