You can also ensure that not many things change over time. My parents have been using Linux for over 15 years and they love it. Mate looks basically the same, as do most of the applications they use (file manager, image viewer, Firefox, Thunderbird, etc.). There's no strange software required for their Brother printer/scanner and nothing suddenly appears with each update.
This how it works or most people in the world. They get a phone and they change it only when they are forced to (hardware failure, some app they absolutely need stops working etc.). The group of people changing phones because they are no longer supported with security fixes is very small.
This is beyond stupid how fucked up the phone market is. I'm still using my 2008 laptop with newest LTS (x)Ubuntu, but my 2018 Android phone lost official support in 2020... Thanks to that, now I have iPhone (longer support) and Fairphone 5 (I like how they try to upstream everything for this phone and promise really long support).
About your question:
Should be fine. As long as browser is up-to-date, she doesn't connect to unknown WiFi networks/Bluetooth devices and she is not targeted. The easiest security fix is to not have anything worth anything on the phone :D
I personally know absolutely no one with a dongle. I know many people who still use phones with jack that are not using it (or have earbuds). I was using wireless headphones before anyone heard of "earbuds" - they are much more convenient in situations where I'm using headphones. Of course, it's anecdotal but it seems that there are much more people like me/my friends than people missing Jack...
IMO the biggest utility of a headphone jack is not for earbuds, it's that it enables you to play music from your phone on basically any device made in the last 30 years. Want to hook up to some random stereo? No problem, you can do it. Want to play music in your car, but you have one of the many cars without Bluetooth? Easy. There's a lot to be said for having a damn near universal audio connector. Bluetooth is nice, but it's not there yet in terms of ubiquity.
My personal use case for the headphone jack is playing music in my car. My car doesn't even have an aux input (I have to use a cassette adapter), let alone Bluetooth. And when I'm on a long drive, being able to play music while charging is a must. I will only very rarely hook up a pair of wired earbuds to my phone, but I absolutely must have a headphone jack.
I'm not claiming that there is no use for Jack. I just think that this is a niche and doesn't require a separate connector in every smartphone. Having a universal connector that can be used for various niche scenarios is IMO enough. We should push for improvements in that regard (e.g. make it easy to charge the phone and use the dongle at the same time).
I wish I had the same problem as you do with your car. Mine is old enough that it doesn't have Bluetooth (I'm not the first owner and Bluetooth was an "extra" in this model) but new enough that there is no cassette player (and no built-in aux input) :)
Right, but the Apple paper I read [1] said that if you did not have iCloud Photos (iow, "put it on the Internet") turned on, CSAM scanning would not occur.
So, how is it different, again?
1. I can't link the paper, because apparently, Apple took it offline. But it was widely-reported on.
Generating a encrypted voucher based on a known CSAM image is not spying anymore than the device cataloguing images by descriptions.
For a technical forum the lack of willingness of individuals to read into the system is perplexing. So far most of the arguments I've read are entirely based on creating a strawman then beating that to death.
Is there anything which prevents non-CSAM images from being added into this catalogue? As I understand it, the only thing stopping that is a promise from Apple - which can be steamrolled by a government request.
>For a technical forum the lack of willingness of individuals to read into the system is perplexing.
Admittedly, I may have missed it... But can you point out to me where this system cannot be expanded to non-CSAM material?
As a totally wild example, is this technology restricted, in some technical manner, from scanning for images which display a certain political leader as Winnie the Pooh?
+ Approximate matching. They might want to have images almost similar also to be flagged.
+ Scope creep. Particular images of people who are wanted or areas where they might live or shots of joints etc.
+ Mistakes. Accidentally flagging honest citizens and the bureaucracy that will follow. "Innocent until proven guilty..." That's not preemptively scanning someone's personal devices.
It was always like that. If your threat model is three letter agency/Mossad/etc than you have very limited options. Relevant XKCD: https://xkcd.com/538/
In Poland you can do a lot of things digitally by authenticating on governments sites with your Bank (Imagine "Continue with your bank" instead of "Continue with Google" or "Continue with Facebook"). It's nice because bank already verified my identity when I was creating a bank account. I did not have to scan&send anything, go verify in some office etc. and I was able to do multiple things: change how my company is taxed, register for COVID vaccination, government census.