

I honestly did not give much thought to the difficulty of pulling such attack off. With “not sophisticated” I just meant that it’s not complex to grasp. “You just have to pretend to be a different person”. I guess yeah that is pretty difficult.
Yeah I mean it’s often said that any second factor is better than just password so it’s probably not a big deal. My issue is mostly that it’s an attack vector that could easily be eliminated. For example if banks allowed third party 2FA apps. I think I’ve read somewhere, that some banks even only allow hardware keys for business accounts which is honestly absurd.
Indeed but I’m not talking about “most users”.
You want to automate something with a script or want to create some workaround for something.
Sure, but these distros aren’t the go-to choice of tinkerers. As I said for the normal Ubuntu user LineageOS is completely fine. “Proper” Linux phone’s target audience are Arch, Gentoo, Void,… users.
For devs sure but “tinkerers” aren’t always devs. They can just start as someone who just “pokes” into their system and eventually dives deeper, or stays forever at the “fix a thing here and there” level. In my opinion you don’t get this granular spectrum of skill. You either are an Android developer (be it Android app or Android system developer) or Android user. Maybe that isn’t true but the original topic was “why Linux phones when AOSP forks exist” and I think “tinkerers” might think this way about Android.