VoLTE isn’t yet supported in Linux because no one has yet completed writing an open source implementation. Unfortunately, phone manufacturers, chip manufacturers, and cell carriers all hold these cards very close to their chests, so drivers have to be written from scratch by reverse engineering the protocols, which are encrypted on top of being completely nebulous. Support is coming, eventually, but it takes an extraordinary amount of time and effort to do this, which nobody has time to do.
Only for Google Pixel phones. The install process is right there. You just need a chromium-based browser (chrome, edge, vivaldi, opera, brave, etc.), an Unlocked Pixel, and the usb cable.
Also, back up your stuff. Flash Unlocking your phone to install a different OS erases everything on it (for security reasons).
Depends. Do you want the possibility of an AI model being able to fork over some private details in your convos? The potential for someone that doesn’t like what you believe in to subpoena google for this data?
As for bricking, it won’t, and the whole process is on the website, using a chrome-based browser and usb cable (it detects which pixel you have and does all the hard stuff) but you do have to back up your stuff as it will erase when it gets graphened.
If you don’t want this stuff on your phone, lemme point you to:
GrapheneOS (Pixels only, has Most Security at Tinfoil Hat level while also providing compatibility for Google Play (optional, sandboxed) and SafetyNet)
CalyxOS (Pixels, Some Moto G 5G, Fairphone 5, 4, SHIFTphone 8, less Security than GrapheneOS but has Security)
LineageOS (Many older devices, runs unlocked boot so least Security but still can run sans google)
So, I assume your greatest competitor is TempleOS…
Browser fingerprinting takes measurement of things the browser exposes. If a browser exposes installed extensions, this can be used to corelate information. If awebsite checks if the browser loaded something or not, that also can be used to corelate.
Example, you (ip address xxx.xxx.xxx.xxx) visited this website (trackingsite.xyz), with a screen resolution of 1920x1080, using a (Mozilla/firefox) browser. The three trigger pixels did not load, meaning you’re using an adblocker, and the remote font loaded from localhost, not google. Your canvas, microphone, and camera are all blocked. Your browser also responded to an api ping for (useful extension). Interesting. This same configuration was also on (othertrackingsite.xyz) and (definitelyalegalsite.xyz), both of which a browser with the same info navigated to for at least 5 minutes, so we know it wasn’t a mistype. This same browser configuration was seen regularly browsing these sites on [days of the week] at [time of day], indicating a regular habit.
We know who you are and where you have gone.
Privacy =/= Security. Windows XP might have good privacy (I would argue Windows 2000 is better for that, as it doesn’t have Product Activation), but security is nonexistant in 2025 in either case. For malware, it’s free real estate.