I found that any software installed on linux system can read the brand, model, hardware specs, system version without root. Knowing that I can choose open source and privacy friendly software that does not collect such information, using Tor Browser, buy the gears with cash, or using Whonix VM to mitigate this risk. On Tails, however, without virtualization, if I wish to run Telegram(given it is a unencrypted spyware) in certain scenario and try my best to hide the device information to reduce fingerprinting. Is there anything I can do to hide or spoof the device model?
Is there any chance the serial number get leaked without root? How can I mitigate this risk?