You probably shouldn’t be accessing a linux distro’s website from mobile
I don’t think it’s good to hand-wave a website’s poor user experience and instead blame the user’s device. The fact of the matter is that Debian’s website is not as responsive as it could (imo, should) be and results in a bad user experience. With mobile traffic being responsible for over 55% of the internet’s traffic, it can be generally assumed a user’s first experience learning about a distro will be on a mobile device. If that first impression is bad, that can spell bad news for that distro’s adoption/onboarding.
In a nutshell, a backdoor was intentionally planted by a malicious actor in xz Utils, an open-source data compression utility widely used in Linux and other Unix-like operating systems. This discovery was made by Andres Freund, a developer and engineer working on Microsoft’s PostgreSQL offerings. He was troubleshooting performance problems on a Debian system. Specifically, SSH logins were consuming excessive CPU cycles and generating errors with Valgrind, a memory debugging tool. Through sheer luck and Freund’s careful eye, he eventually discovered that these issues were the result of updates made to xz Utils. Upon closer inspection, he found that updates to xz Utils were the result of a maliciously inserted backdoor. The backdoor, present in xz Utils versions 5.6.0 and 5.6.1, manipulated the sshd executable, allowing anyone with a predetermined encryption key to upload and execute arbitrary code on affected devices.
"I like the business model of ‘I want money so I make something that I think is worth money, and you pay me that money and you get the thing, and we’re all happy’,” Szymanski continued. “That’s it. There’s nothing complicated or hidden here.