The thing about most default configs of any OS is that user storage is largely accessable to all apps. True of Linux, Android. Windows, ...
Graphene has options to restrict that but you have to set it up that way. Android also has App sandboxing for app data.
Thinking through the threat model of course is always good as is hardening. All security is porous. Linux is fine generally. If one is exposing services on the public net it is not clear that any OS or software is sufficiently secure, that takes constant effort in terms of monitoring and management.
We looked into a replacement for our 2014 Volt (maybe worth $3500). Not even possible to get and price was nuts (1 year back order and $16K). The only reasonable option was a 3rd party replacement which seem to be in the $3K-$6K range. Turned out we did not need it thankfully, it was some other problem. We expect to need a replacement at some point as we will run the car to at least 15 years.
The primary reason to use Lemmey is decentralization and avoidance of Reddit enshitification. Lot of Lemmey blocks shit show lemmey nodes though I am sure they exist.
There are various designs of backlights. They typically have a stack of loose components in an assembly. By loose I mean not totally fixed but not too free. They have to free float enought that temperature changes do not cause issues. They also have to not stick, warp, or buckle over time. Harder to engineer then you might think.
So consider what might happen if for example the top backlight film might buckle some then stick to the back of the lcd. The film might deform which would change its optical properties. Then later thermal cycling might cause release. It might do same elsewhere.
Not saying this is mechanism, but just example.
Edit: Keep in mind the LCD is glass, and the backlight components are plastic. Very different thermal expansion coefficients. Then add LED or CCFL lighting and you have a big changing heat source. Add on top of that humidity changes too.
Sounds to me like the backlight behind the LCD. They have components which could potentially sag, stick, or warp. White screen is probably best way to see. Also look at various angles. May be more visible at some angles then others.
Hard to unsee. I know this feeling. I used to work in the industry years ago. Displays are never perfect and hard to unsee things once you see them especially when it was part of your job.
If you have never used a password on windows or some other authentication mechanism then your Windows is not very secure.
Most of the differences you quote are pretty much the same both systems.
I guess the one exception is the UAC prompt which on Linux is a bit more secure in that it requires a password. Some random person or app cannot just click through it.
What is all this for criminals BS. Graphene is one of the best ROMs out there if your willing to use Google hardware. Pretty much just works and without the normal bloat.
That is interesting. You can do that by the command line. Basically run cryptsetup to map the encrypted partition, then run mount. Those commands could also be place in a bash script too. You may need sudo access to run cryptsetup. You will need sudo access for mount unless you configure it as user mountable and not auto mounted in fstab.
You also want script to umount it and unmap it with cryptsetup when done.
However when many apps have a permission it becomes meaningless.