Skip to content

Yes, you can make sure your technology survives obsolescence

    First we buy a gadget. In the coming years, the manufacturer will occasionally release a software update that fixes bugs and protects us against vulnerabilities. One day those updates will stop coming. According to conventional wisdom, that’s the time to buy a new device.

    But what if it isn’t?

    The truth is, upgrades don’t have to be so automatic. We can often slow them down if we follow some security best practices and take control of our personal technology. After all, it’s unrealistic for anyone to upgrade on a tech company’s schedule — some devices, including expensive Android phones, stop getting software updates after as little as two years. Not all of us have the time or money to regularly buy new products.

    At the same time, we don’t want to hold onto our gadgets for so long that they become vulnerable to bugs, cyber-attacks and other flaws. Software upgrades are usually necessary for those reasons. Everyone should be able to safely use technology to live and work, says Hilary Shohoney, the executive director of Free Geek, a nonprofit that recycles outdated machines for schools and seniors.

    “We need to walk the line between what is reality for many people and recognize that everyone needs to engage with the digital world,” she said. “It’s not fair to say you need the best computer to get the best security.”

    So how do we walk that line? While eventually a new gadget will have to be bought, there are some ways to keep your devices running safely even if the manufacturer stops providing software updates. Here’s what you need to know.

    Think about how we use technology today. On computers, much of what we do, from doing homework to editing spreadsheets, is done via a web browser. On phones, we rely heavily on both the internet and apps.

    So staying safe online without direct help from a manufacturer largely involves taking steps to browse the web and use apps. Here are some things to watch out for:

    • Keep your browser up to date. Staying informed about browser updates provides some protection against malicious websites. Reliable browser companies like Mozilla, the maker of Firefox, update their apps to work on computers that are more than 10 years old.

    • As always, avoid suspicious behavior. Don’t open messages or click on links from unknown senders, and if possible, only use apps offered by trusted brands, says Sinan Eren, an executive at Barracuda Networks, a security firm.

    • Be wary of shady apps. Android devices are more susceptible to malware than Apple phones, in part because they can be set to install apps from unauthorized app stores. In addition, many manufacturers stop supporting Android devices after only two years. Google declined to comment. Owners of outdated Android devices can add a layer of security by installing a malware scanning app from brands like Malwarebytes, NortonLifeLock, and Lookout.

    • Secure your online accounts. Even if your device’s software is outdated, setting up your online accounts with two-factor authentication — a security practice that generates a unique code via an app or text message when you log in to a site — can help prevent inappropriate access to your account. in case your password is stolen.

    By doing all of the above, the risk is reduced, but not eliminated. Dan Guido, the chief executive of Trail of Bits, an internet security company, said legacy devices were wide open for attackers to exploit because of known vulnerabilities in old software.

    “Unsupported devices are a stable target – a sitting duck – for attackers,” he said.

    There are more advanced steps that can keep a device functional and safe beyond its supported lifetime. One is to replace the manufacturer’s software system with an alternative.

    Shohoney’s non-profit organization, Free Geek, based in Portland, Oregon, is breathing new life into old personal computers by installing a copy of Linux, the open-source operating system known for robust security and used for basic tasks such as surf the web, exchange e-mail and prepare documents.

    Installing another operating system requires some technical knowledge, but numerous resources and online tutorials provide step-by-step instructions for adding Linux to outdated Windows and Mac machines.

    Smartphone owners have fewer options. For Android, LineageOS, an open-source mobile operating system, has received positive reviews for its robust security.

    However, outdated Apple mobile devices cannot be easily modified to install an alternative operating system. In fact, security experts advise against jailbreaking or injecting unauthorized software, as this can weaken the security of the Apple device.

    We can also take steps with our hardware, such as replacing an outdated battery, to keep our devices running. But over time, when the cost, effort, and risk add up and make resuscitating a device impractical, upgrading is the way to go.

    That doesn’t mean we have to haul our devices to a recycling center. For example, turning off an aging iPad’s Internet connection can safely use it for light tasks like playing music or jotting down recipes, says Kyle Wiens, the CEO of iFixit, a company that provides tools and instructions for repairing. of technical products.

    “If it’s not connected to the internet, it doesn’t matter that it’s outdated,” he said.