I fear that this project, just like almost all other similar ones, just spread a false sense of a "sustainable, privacy and security focused free software mobile OS".<p>Almost all mobile devices, and surely all smartphones and tablets, require a large number of so-called "vendor blobs" (or just a single huge one) needed to operate almost all the hardware: wifi, Bluetooth, baseband "modem" and even GNSS receivers and touch input.<p>Those vendor-provided, undocumented and closed source software all need to run with high privilege levels, aka root. Thus they can do, intercept and inject almost anything within the device with no user interaction or authorization.<p>So, IMHO, all those projects simply give users "more power", but only as far as the vendors allow for. While an unknown amount of power is used by some other third (or fourth or fifth) party silently and undetected.<p>A small example.<p>That super secure auditable open source communication application does use strong cryptography, but still needs to use those blobs for unencrypted human-oriented I/O.<p>Whatever you type, scan display and record will need to get in through those blobs in an unencrypted (or maybe backdoored) blobs to get to and from the user or before getting through the encryption mill.<p>Have you ever heard about those spying or surveillance Trojans? Those are them!<p>How can we trust that? Simply we cannot. We just pretend it will be a fair play in a game we don't fully know.