Don't use biometrics a pin has been shown to have more 5th amendment protections.
Have your phone automatically reboot at a regular time every day. When your phone reboots a lot of the exploits that can get into your phone are locked out because they rely on reading the active memory.
I put all my cloud file sharing into the same local folder and let them fight it out, but also have a bitorrent sync of my monthly disk image as the backup.
Have some oe on something similar, we created two laptops that ran Linux to mimic something in our plant, the issue with them though was drivers, we got the bleeding edge and components like the network card and graphics card just didn't work for a month or two until new drivers came out. It was red hat from maybe 2020 time frame.
It could be that they chose something bleeding edge and the hardware drivers were built for windows but might be a couple revisions behind for the Linux equivalents. It could be the development cycle for windows vs that of Linux and how they integrate with new hardware. Just a hypothesis.
reply