Tech paranoid all the way, although not the same type of tech paranoid as Luke Smith. The only good computer is one you have the hardware schematics to (i.e. virtually none of them). Thinkpads are just another brand of overpriced laptop. Besides the occasional steam game, I heavily prefer FOSS only and will flat out refuse to use anything with heavy drm.
This is only for laptops by the way. System76 desktop BIOSes are still closed source. It’s such a shame that there’s no FOSS BIOS for desktop PCs, hopefully AMD OpenSIL changes that.
Assuming the schematic is for repairability, not security.
Seems unlikely that enthusiasts would have the equipment to non-destructivly identify malicious deviations from spec, introduced by competent actors.
Tech paranoid all the way, although not the same type of tech paranoid as Luke Smith. The only good computer is one you have the hardware schematics to (i.e. virtually none of them). Thinkpads are just another brand of overpriced laptop. Besides the occasional steam game, I heavily prefer FOSS only and will flat out refuse to use anything with heavy drm.
Purism, System76 and, more recently, Framework
What’s the point if they still have AMD, Intel, Nvidia, Qualcomm, etc. chips on them?
You mean things like the Intel Management Engine? I think they are partially disabled, like in librebooted ThinkPads.
Welcome to riscv
This is only for laptops by the way. System76 desktop BIOSes are still closed source. It’s such a shame that there’s no FOSS BIOS for desktop PCs, hopefully AMD OpenSIL changes that.
Werent they gonna make them foss? Heard it some time ago so who knows
I’m not sure they can make them FOSS because they don’t make their desktop motherboards AFAIK. They’re much harder to make than laptop ones.
PinePhone Pro for the mobile side. The schematics are available. I quite like mine, especially with the keyboard case. It’s basically a pocket laptop.
Assuming the schematic is for repairability, not security. Seems unlikely that enthusiasts would have the equipment to non-destructivly identify malicious deviations from spec, introduced by competent actors.