I did quite some reading in my time, as I mentioned. The methods you are describing are riddled with ifs and buts. The reality is that even online systems arent hacked if they dont have obvious flaws like passwords in root ssh. on the other hand tools like john the ripper can break each and every common encryption given the right circumstances. Its no difference. Its all just marketing.
im daily driving the pinetime on a postmarketos phone. it is glorious. but you kinda need to want to stick it to the man for maximum pleasure because thats whst youre doing. thats how it feels to me anyway.