zlacker

Graphene OS: a security-enhanced Android build

submitted by madars+(OP) on 2025-07-24 21:48:53 | 749 points 540 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
◧◩
10. metalm+op[view] [source] [discussion] 2025-07-25 00:59:54
>>SchwKa+Tn
https://calyxos.org/ does a few other devices, seems aimed strait at true privacy
◧◩
12. transp+Wp[view] [source] [discussion] 2025-07-25 01:03:28
>>ranger+hg
OpenTitan has open silicon (RISC-V) and is capable of open firmware (based on Rust TockOS) and is coming to 2025 Chromebooks, >>44416304 . Hopefully a derivative of OpenTitan will ship in future Pixel devices.

Google Pixel hardware provides nested virtualization, enabling a Debian Arm "Linux Terminal" in pKVM/AVF VM, with use of Debian package repos.

13. usuall+8q[view] [source] 2025-07-25 01:05:34
>>madars+(OP)
I was tempted to use this but when I looked into the team behind it there seemed to be some issues as exposed by Louis Rossman here: https://youtu.be/Dl1x1Dy-ej4.

Instead, I installed CalyxOS and have been using it over a year now and I'm very happy with it. Check it out.

◧◩◪
15. mbanan+1r[view] [source] [discussion] 2025-07-25 01:13:34
>>metalm+op
GrapheneOS community manager here.

I would recommend checking out https://eylenburg.github.io/android_comparison.htm for a third-party comparison of these projects. They're not really similar.

CalyxOS downgrades security compared to the Android Open Source Project, often falls significantly behind on standard Android privacy and security patches as is the case right now (they still haven't ported to Android 16 which is required to have the latest patches) and doesn't provide similar privacy or security features.

Features like Contact Scopes, Storage Scopes and our Sensors permission toggle are some of the privacy features includes in GrapheneOS.

Privacy necessitates security. The security provided by GrapheneOS is in order to be able to protect privacy.

◧◩
19. mbanan+vr[view] [source] [discussion] 2025-07-25 01:18:06
>>perchi+go
Hi, GrapheneOS community manager here.

There are some corrections that we have contacted the author about regarding the history of the project. They initially e-mailed us to ask a few questions but seems to have maybe misunderstood something.

For clarity, GrapheneOS is the continuation of CopperheadOS, not a new project that spun off from it.

As an example, it can be seen that our repositories and legacy bugtrackers are ours:

-https://github.com/GrapheneOS/platform_manifest/forks?includ...

-https://github.com/GrapheneOS/platform_bionic/forks?include=...

-https://github.com/GrapheneOS-Archive/legacy_bugtracker/issu...

It's a direct continuation, but was renamed to GrapheneOS post the failed takeover attempt. GrapheneOS has persevered and is all the stronger for it. Over a decade now. :)

◧◩
20. mbanan+Kr[view] [source] [discussion] 2025-07-25 01:19:28
>>SchwKa+Tn
GrapheneOS community manager here. Google's devices are currently the only ones that meet our requirements (https://grapheneos.org/faq#future-devices).

However, we're currently working with another OEM and are hoping to have a device of theirs meet our requirements that can be launched in 2026 or 2027. Nothing set in stone, but we're optimistic thus far.

◧◩◪◨
32. transp+qu[view] [source] [discussion] 2025-07-25 01:50:31
>>orbisv+Rt
MTE is an Arm v9 feature subset of CHERI, >>30007474 | https://armor.ch/mte/hw

https://discuss.grapheneos.org/d/8439-mte-support-status-for...

> Hardware memory tagging is going to provide a massive increase to protection against remote exploitation for GrapheneOS users. It's the biggest security feature we'll be shipping since we started in 2014.

34. throwa+Ou[view] [source] 2025-07-25 01:55:04
>>madars+(OP)
The main missing feature is password under duress that would open a different “user”. So even if you’re forced to give away your password they won’t get to the real account (some hidden profile or similar).

At least hidden profiles would be good enough for basic protection.

They have this which wipes your device, but you can get killed under duress. https://discuss.grapheneos.org/d/14722-using-duress-password...

◧◩◪◨⬒
35. hsbaua+cv[view] [source] [discussion] 2025-07-25 01:58:28
>>mbanan+ws
I got curious and found this: https://discuss.grapheneos.org/d/7208-8y-security-updates-on...

At the risk of doing their work for them, that seems like a near ideal partnership opportunity for graphene, so it’s extra sad to see.

◧◩
38. mbanan+rv[view] [source] [discussion] 2025-07-25 01:59:57
>>mjbale+7u
Hi there. GrapheneOS community manager here.

It's important to note that GrapheneOS is not some niche barely-used project. It has existed since 2014 and is used by multiple hundreds of thousands of people at this point. There are also many eyes on the project through people forking it to make their own products, people maintaining their own builds etc. GrapheneOS is also reproducible in addition being open source.

On our side, we are very particular about accepting outside contributions if they don't need meet our standards, and code is heavily reviewed within our team before being merged.

I'd also recommend giving https://grapheneos.org/faq#audit a read through.

All in all, your concern, while valid, isn't something that's likely to happen precisely because we're very aware of situations where it has (see xz) and are therefore very vigilant. The kind of thing you're worried about isn't likely to come from a big project like GrapheneOS that has many eyes on it, but rather something small that's used everywhere and barely has a couple of devs working on it, if that (again, see xz).

◧◩◪◨⬒⬓
46. strcat+0y[view] [source] [discussion] 2025-07-25 02:18:07
>>hsbaua+cv
Fairphone devices have 1-2 month delays for partial security patches. They have a year or more of delays for new major releases. Their recent Fairphone 5 uses the Linux 5.4 LTS branch going end-of-life in December 2025 with no plan to port to a new LTS branch. Their past devices use end-of-life Linux kernel branches. They do not provide the expected security patches even shortly after release. They aren't doing the bare minimum and aren't even compliant with recent EU regulations for device updates.

Google provided resources for the Linux kernel to extent LTS support for 6 years for their 5 year guarantee with the Pixel 6. It ended up not being needed since Pixels began moving to newer Linux LTS branches. The official Linux kernel LTS support is back down to 2 years. The 6 years was meant to benefit all Android devices but it proved to be too difficult to do well and it makes more sense to invest a far smaller amount of resources moving to new LTS branches.

Fairphone presents providing an Android OS release 3 years after it was released as providing 3 more years of extra support compared to an OEM releasing it in the month it was launched as their final update. That doesn't make sense.

They've repeatedly had blatant security flaws such as using publicly available private keys for signing the OS on the Fairphone 4. These issues are downplayed rather than being acknowledged.

There are important security features missing, but the main issues are the lack of proper updates and their approach to security flaws being reported and discussed.

Many Android OEMs are a better fit for a partnership with us and we're working with one.

https://discuss.grapheneos.org/d/24134-devices-lacking-stand... is a better thread about this than the one you linked.

52. ChrisA+Fz[view] [source] 2025-07-25 02:31:31
>>madars+(OP)
Related:

Cops say criminals use a Google Pixel with GrapheneOS – I say that's freedom

>>44658908

Cops in [Spain] think everyone using a Google Pixel must be a drug dealer

>>44473694

ICEBlock, an iOS Exclusive

>>44672521

◧◩
53. strcat+Jz[view] [source] [discussion] 2025-07-25 02:32:14
>>aussie+Et
It sounds like you're in a region not supporting E911 but rather depending on Google's proprietary Emergency Location Service. We plan to make our own implementation of what that provides:

https://github.com/GrapheneOS/os-issue-tracker/issues/1174

GrapheneOS supports E911 and has our own network location implementation you can enable which gets used by it. Unlike Google's implementation, our network location is based on location position estimation similarly to iOS. Unlike iOS, we'll be providing full offline support for it.

55. minima+0A[view] [source] 2025-07-25 02:34:52
>>madars+(OP)
Last I heard, Google discontinued publishing device trees and driver binaries for Pixel devices with their recent changes to their stewardship of the AOSP [0]. Was it something definitive or are they merely delayed? If the practice is being discontinued, what would be the reason why? Doesn't publishing these artifacts create a business case for customer demand for the Pixel devices? Or is there some cost that outweighs the benefits? Is it maintainer overhead?

I didn't bring this up when it was a news story last month because there was a lot of cynicism in the thread, but I am genuinely curious. I am really grateful for both GrapheneOS and Google for creating a phone platform that Just Works for the essential stuff and that I can reasonably recommend to non-technical people!

[0]: >>44259921

◧◩◪
56. strcat+fA[view] [source] [discussion] 2025-07-25 02:36:22
>>cromka+qz
GrapheneOS supports E911. It doesn't have Google's proprietary Emergency Location Services implemented as part of Google Play services which some countries depend on. We plan to implement the same standard it does for regions without support for a variant of E911:

https://github.com/GrapheneOS/os-issue-tracker/issues/1174

◧◩◪
57. YoumuC+lA[view] [source] [discussion] 2025-07-25 02:36:39
>>mbanan+Zv
I hate to say this but I don't foresee Graphene being "mainstream". Most users will stick to the stock ROM. The most "mainstream" custom ROM Lineage is only installed on 0.04% of Android devices as of 2023 [1]. Even if Graphene appears in some mainstream news, I highly doubt any ordinary person can recognize it when they see one.

If the threat model is hiding from random people, I think a hidden profile works very well.

Now let's talk about motivated adversary as you put it. Hidden profile and wiping are not either-or, they can coexist. If one is really targeted by a motivated adversary, it should be apparent in most cases, and the targeted person can choose to enter the wiping PIN instead of the secondary profile PIN.

Now if one is targeted by a really motivated and threatening adversary, I don't think wiping PIN is any better than secondary profile PIN. The moment one chooses to wipe the phone, the adversary could be triggered by the action and harm the victim anyway.

[1] https://9to5google.com/2023/11/20/lineageos-number-of-device...

◧◩
60. mbanan+lB[view] [source] [discussion] 2025-07-25 02:44:07
>>usuall+8q
Hi there. GrapheneOS community manager here. It's a weird video to bring up without any context. Louis Rossmann made that video and leaked private conversations that were had fairly soon after the person in question was repeatedly swatted by someone who has a fan of the person Rossmann was voicing support for.

Unfortunately, Rossmann turned out to be very dishonest, which in retrospect makes sense, seeing as he has no issues with using Kiwi Farms. He's verified account there is named "larossmann". I suggest you look into it.

It's not just something he's done with GrapheneOS and the founder of the project. There are many videos, such as the one he did on Linus from Linus Tech Tips where he similarly misrepresented things and ascribed mental health labels on them.

Regarding CalyxOS, I would recommend people check out https://eylenburg.github.io/android_comparison.htm as a third-party comparison for various projects, including GrapheneOS and CalyxOS. They're not similar projects.

◧◩
64. strcat+RC[view] [source] [discussion] 2025-07-25 02:57:30
>>minima+0A
Android 16 no longer provides device trees for Pixels as part of the Android Open Source Project. It's important to note it doesn't provide those for any other devices. There are no other OEMs providing similar AOSP support. A few OEMs publish more basic device trees for older Android versions. This was Pixels losing one of their advantages compared to non-Pixels but it was never one of our hardware requirements, which are listed at https://grapheneos.org/faq#future-devices. It isn't part of why Pixels are the only devices meeting our requirements. We're working with a major Android OEM to change that though, hopefully for 2026 or at least 2027.

GrapheneOS typically ports to new yearly Android releases in a couple days and tends to have it reach the Stable channel in under 2 weeks. We completed our initial port to Android 16 in a similar time period after the release on 2025-06-10. However, we then had to reimplement device support in a similar way to how we would support a non-Pixel device. Our initial production release based on Android 16 was published on June 30th. As usual, we had to spend around a week making a series of releases fixing regressions reported by users. It reached our Stable channel on July 8th.

Since our port to Android 16 took significantly longer than usual, we backported most of the Android 16 firmware, all of the kernel drivers and parts of the userspace device support to our now obsolete Android 15 QPR2 branch and did a few more releases based on Android 15 QPR2 where we were able to provide the full 2025-06-05 patch level which also turned out to be the full 2025-07-05 patch level due to no vulnerability fixes in the July 2025 Android Security Bulletin or Pixel Update Bulletin. This was an unusual approach and not generally a reasonable way of doing things. We were able to do it successfully.

It won't be nearly as much of an issue going forward since we dealt with building the new automation we needed. Our port to Android 16 QPR1, Android 16 QPR2, Android 16 QPR3, Android 17, etc. shouldn't be nearly as difficult and we should get back to our typical porting time for major releases.

◧◩
65. BLKNSL+TC[view] [source] [discussion] 2025-07-25 02:58:07
>>usuall+8q
"Never meet your heroes". Also, the opening monologue to Tool's Third Eye[0].

The older I get the more examples I've come across of a person destroying their reputation by either self-over-exposure (social media) or just basic exposure via news of some outrageous or illegal behavior.

I don't have a problem with whatever line you choose to not cross, and I was once much more self-righteous, but I've more recently pretty much made the conscious decision to separate product from producer, art from artist, etc.

Theo Lengyel was recently arrested for murdering his girlfriend, and yet I will still listen to and enjoy Mr. Bungle's music.

Gary Glitter... I still like the song Rock n Roll Part Two.

J.K. Rowling has some controversial views on transsexual women, but that doesn't mean that the Harry Potter series is any less worthwhile reading than it was before.

ReiserFS

I still buy Nestle Quik occasionally

Steve Jobs, Bill Gates, Mark Zuckerberg, name almost any tech bro... (but not Steve Wozniak, he's a treasure)

Sports stars.

Musicians.

I wonder how many other things are worthy of protest if we knew all the facts about all the people who were involved in it's creation.

(I'm attempting to respond to the general concept of "he/she/they bad = it bad", not commenting on GrapheneOS vs CalyxOS or anyone's personal choice over where / what they choose to apply "he/she/they bad = it bad" to, other than saying that it should be a conscious decision not a reflexive reaction)

[0]: https://genius.com/Tool-third-eye-lyrics

◧◩◪
71. strcat+cE[view] [source] [discussion] 2025-07-25 03:13:07
>>NewJaz+gC
> If they are selling off their device business

Android and Chrome are potentially going to be split from Google:

https://www.nytimes.com/2024/11/20/technology/google-search-... (https://archive.ph/egRL4)

Pixels are no longer the Android reference devices. An Android company ending up with the OS, Google Play and Google's OEM partners wouldn't need Pixels. That's a possible reason for the change. However, the simplest explanation is that they're continuing to take cost cutting to an extreme where it negatively impacts their long term revenue far more than the money it saves. A lot of Pixels were sold due to first class support for using other operating systems including it not voiding the warranty.

◧◩◪
88. robmus+RL[view] [source] [discussion] 2025-07-25 04:44:35
>>1024co+sK
F-Droid app store. https://f-droid.org
94. sebtro+aN[view] [source] 2025-07-25 05:06:25
>>madars+(OP)
I have used LineageOS [0] for a few years on my old phone, and last year I got a Pixel 4 and I am using Graphene on it. Both systems work well and I am really glad they exist; Graphene gets extra points for its extremely easy installation process. Unfortunately it seems Graphene is already phasing out support for the Pixel 4 [1], so I'll have to switch back to Lineage at some point.

The only technical limitation I have encountered using these ROMs is related to GPS: my position is often lost and I need at least multiple minutes to gain it back (or sometimes it never comes back, depending on where I am). This is likely related to not using Google's location services, even though I have turned on all settings like using WiFi / bluetooth to improve the location accuracy. I tried every advice I found online, without luck. Somehow the issue is a bit worse on Graphene, as my position is lost every time I close the Maps app, but it may be related to the phone and not the OS.

[0] https://lineageos.org/

[1] https://grapheneos.org/faq#supported-devices

◧◩
95. hft+mN[view] [source] [discussion] 2025-07-25 05:10:34
>>Sytten+zH
My workaround for using both NFC payments and Graphene OS is wearing a Google Pixel Watch (1). All other Google Wallet features besides NFC payments should work.

[1] https://discuss.grapheneos.org/d/475-wallet-google-pay/4

◧◩◪
106. mikae1+wR[view] [source] [discussion] 2025-07-25 05:58:41
>>1024co+sK
Obtanium[1], F-Droid[2], Aurora Store[3] and FFUpdater[4] are some options. Signal self updates from the APK download[6].

I recommend putting proprietary Play Store apps grabbed with Aurora Store in the work profile with Shelter[5].

[1] https://obtainium.imranr.dev/

[2] https://f-droid.org/

[3] https://f-droid.org/packages/com.aurora.store/

[4] https://f-droid.org/packages/de.marmaro.krt.ffupdater/

[5] https://f-droid.org/packages/net.typeblog.shelter/

[6] https://signal.org/android/apk/

◧◩◪◨⬒⬓
125. easyKL+bV[view] [source] [discussion] 2025-07-25 06:37:17
>>ThePow+1U
Need the Maps data, the satellite picture, or StreetView? All these past years this WebView wrapper have been working like a charm https://f-droid.org/packages/us.spotco.maps
◧◩
127. bernou+GV[view] [source] [discussion] 2025-07-25 06:41:25
>>ajb+RM
According to the developers, beside the AOSP software itself, there seems to also be hardware requirements that only the Pixel satisfies.

https://grapheneos.org/faq#future-devices

As a large company, they are probably targeted through their devices and since they have the means, it does make sense that the Pixel devices have high security standards compared to other OEMs.

◧◩◪
128. notach+cW[view] [source] [discussion] 2025-07-25 06:45:40
>>strcat+RC
> We're working with a major Android OEM to change that though, hopefully for 2026 or at least 2027.

Is there any chance that you fabulous guys could lobby for a smaller <5 inch phone with that OEM? (reference >>44586723 )

◧◩
130. worlds+pW[view] [source] [discussion] 2025-07-25 06:47:31
>>rdesca+2L
https://grapheneos.org/usage#web-browsing
◧◩
147. kupfer+501[view] [source] [discussion] 2025-07-25 07:24:27
>>nvdr+sY
Check https://grapheneos.org/donate
◧◩
151. pedro_+C01[view] [source] [discussion] 2025-07-25 07:31:42
>>sandre+yS
Worth mentioning that Fossify also has an amazing Contacts and Calendar app (using both right now on Android 15).

https://www.fossify.org/apps/

Fossify is a FOSS project with a handful of volunteers and they do take donations:

https://www.fossify.org/donate/

◧◩
160. jraph+e21[view] [source] [discussion] 2025-07-25 07:46:12
>>sandre+yS
> Organic Maps - Open Source navigation (not as good as proprietary ones though)

Note that a community fork done by some core contributors was just spawned: CoMaps [1]

> K9 Mail / FairMail - Mail client

And now there's Thunderbird, which is branded version of K9 Mail IIUC (I don't know if there's any reason to switch from K9 Mail to Thunderbird for existing users)

[1] https://f-droid.org/en/packages/app.comaps.fdroid/

◧◩◪
164. izacus+331[view] [source] [discussion] 2025-07-25 07:51:36
>>dgan+kU
Someone's keeping a list of banking apps known to currently work with GrapheneOS: https://privsec.dev/posts/android/banking-applications-compa...

Check if yours is on the list.

◧◩
170. zevon+P31[view] [source] [discussion] 2025-07-25 07:57:20
>>torium+Q11
I think it's perfectly valid to consider this as problematic (the GrapheneOS team certainly seems to think this is not ideal, for example). However - somewhat counter-intuitively - it's also valid to consider Pixels as among the most secure and most appropriate Android phones for something like GrapheneOS.

They write about their reasoning and criteria for device support here, for example: https://grapheneos.org/faq#future-device.

◧◩◪◨
187. rkrisz+u61[view] [source] [discussion] 2025-07-25 08:25:24
>>mikae1+wR
On the GrapheneOS forum you will see a lot of bad opinions about F-Droid, for example this:

> It doesn't matter that the app is trustworthy, because F-Droid are extremely incompetent with security and the apps you install from F-Droid are signed by F-Droid rather than the developer.

https://discuss.grapheneos.org/d/20212-f-droid-security-in-s... https://discuss.grapheneos.org/d/18731-f-droid-vulnerability...

They also say, if you use F-Droid, at least use F-Droid Basic:

> Dont use the main F-Droid client. Android is pretty strict about SDK versions and as F-Droid targets legacy devices, it is very outdated.

https://discuss.grapheneos.org/d/11439-f-droid-vsor-droid-if...

> If the app is only available on F-Droid / third party F-Droid repo, use F-Droid Basic and use the third party repo rather than the main repo if available. > > If the app is available on Github then install the APK first from Github then auto-update it using Obtanium. Be sure to check the hash using AppVerifier which can be installed from Accrescent (available on the GrapheneOS app store).

https://discuss.grapheneos.org/d/16589-obtainium-f-droid-bas...

By the way, while GrapheneOS recommends Accrescent, I don't use it anymore because they can't even add apps like CoMaps, while some of the apps they actually added are proprietary.

◧◩◪
204. morser+ia1[view] [source] [discussion] 2025-07-25 09:09:35
>>lrvick+K21
It's not all grim. GrapheneOS utilizes IOMMU to isolate the baseband and sandbox the wireless components. Even with binary blobs, the wireless radios cannot read encrypted traffic.

https://grapheneos.org/faq#baseband-isolation

Sure, it's not perfect, but it's still really, really good. Even with the binary blobs that are on it, Graphene phones have been impossible to unlock via commercial cracking tools since 2022.

https://osservatorionessuno.org/blog/2025/03/a-deep-dive-int...

◧◩
212. prophe+0e1[view] [source] [discussion] 2025-07-25 09:50:12
>>lollob+1b1
The issue isn't with NFC. It's passing the Play Integrity check that app developers optionally can use to prevent devices that don't pass the check from running their app, or remove parts of its functionality. IIRC I don't think any custom ROM's can pass the check. So you might be able to pay via NFC with a banking app if they don't implement the Play Integrity API. For Graphene's thoughts on the matter (2024):

https://grapheneos.org/articles/attestation-compatibility-gu...

◧◩
234. backsc+Ai1[view] [source] [discussion] 2025-07-25 10:38:26
>>sjw987+di1
Yes it will make it more secure (and faster!), but it is already receiving only bare EOL updates, but will definitely give it some life extension. See: https://grapheneos.org/faq#supported-devices
◧◩◪◨
257. acheon+Un1[view] [source] [discussion] 2025-07-25 11:35:20
>>lollob+Ek1
Yes https://discuss.privacyguides.net/t/revolut-is-blocking-new-...
◧◩◪
259. jech+4o1[view] [source] [discussion] 2025-07-25 11:36:48
>>ThePow+CU
>>The only technical limitation I have encountered using these ROMs is related to GPS: my position is often lost

> Graphene's new network location feature

I believe it uses https://beacondb.net/, which is starting to have fairly decent coverage, at least in large parts of Europe. You can contribute to BeaconDB even if you have an ordinary Google phone by installing https://github.com/mjaakko/NeoStumbler.

I use LineageOS myself (because Graphene no longer supports my Pixel 5), and unfortunately it doesn't do network location out of the box. You can get network location on LineageOS by installing MicroG, but it's currently somewhat flaky.

◧◩◪◨⬒⬓
269. shlip+Vp1[view] [source] [discussion] 2025-07-25 11:55:19
>>_blk+jT
Librera Reader has a scroll mode : https://f-droid.org/en/packages/com.foobnix.pro.pdf.reader/
◧◩◪◨
275. rst+Ys1[view] [source] [discussion] 2025-07-25 12:24:48
>>gf000+lp1
People go through all sorts of weird mental gymnastics about this. The FSF at one point took the position that binary blobs were cool so long as they could not be upgraded, because then you could pretend they weren't software at all, but just part of the wiring. I've seen this odd line of thought attributed to RMS himself, but here's an FSF statement, from when he was running it: https://www.fsf.org/blogs/community/task2-openmoko
◧◩◪◨
302. cf100c+jE1[view] [source] [discussion] 2025-07-25 13:42:33
>>mikae1+wR
Also check out Neo Store: ''An F-Droid client with modern UI and an arsenal of extra features.''

https://github.com/NeoApplications/Neo-Store

◧◩◪
305. skim+XE1[view] [source] [discussion] 2025-07-25 13:46:22
>>throwa+vt1
I believe this is in the works: https://bsky.app/profile/grapheneos.org/post/3lqbhoqwrjs2y
◧◩◪◨
307. jraph+tG1[view] [source] [discussion] 2025-07-25 13:56:01
>>Liquix+aD1
I don't think the fork is very different right now, and I doubt inputting addresses works differently.

You might want to try:

- writing the city name at the beginning

- putting the street number at the end

Note that OSM might not have the street number. If it doesn't, searching for it will fail for sure.

You should probably file an issue: https://codeberg.org/comaps/comaps/issues

◧◩◪◨
309. RealSt+8J1[view] [source] [discussion] 2025-07-25 14:11:08
>>jech+4o1
In newer Android versions, network location with microg requires an additional patch to work. Else you only get GPS.

See note at the bottom here: https://github.com/microg/GmsCore/wiki/Installation

◧◩◪◨⬒⬓
332. bernou+aT1[view] [source] [discussion] 2025-07-25 15:02:29
>>Klonoa+ko1
The main source is the video, where you can see the GOS developer writing him live.

For more context, there was a Google Drive link that is unfortunately not available anymore, but I found and uploaded it here: <https://www.swisstransfer.com/d/d75ff782-4a7d-4497-b04e-edd1...>

It has they initial conversation and disagreement in September 2022, after the GOS developer in question accuses Rossmann of being complicit with harassment campaigns again said dev., because he also gave the same 40K USD FUTO grant to other similar project and had some interview with their developers.

The second set of files are the text messages that feature in the video, after said GOS developer contacted Rossmann umprompted on May 2023 with the same type of accusation.

Feel free to peruse and make you own opinion.

◧◩◪◨⬒⬓
333. bernou+gT1[view] [source] [discussion] 2025-07-25 15:03:05
>>other8+bh1
The main source is the video, where you can see the GOS developer writing him live. For more context, there was a Google Drive link that is unfortunately not available anymore, but I found and uploaded it here: <https://www.swisstransfer.com/d/d75ff782-4a7d-4497-b04e-edd1...>

It has they initial conversation and disagreement in September 2022, after the GOS developer in question accuses Rossmann of being complicit with harassment campaigns again said dev., because he also gave the same 40K USD FUTO grant to other similar project and had some interview with their developers.

The second set of files are the text messages that feature in the video, after said GOS developer contacted Rossmann umprompted on May 2023 with the same type of accusation.

Feel free to peruse and make you own opinion.

◧◩
342. ysnp+HX1[view] [source] [discussion] 2025-07-25 15:27:05
>>minima+0A
It may be permanent and I think this was the official indirect response:

"AOSP needs a reference target that is flexible, configurable, and affordable — independent of any particular hardware, including those from Google." [0]

Emphasis on independent of any particular hardware.

Current speculation/inference suggests it is because of the antitrust case against them, preparing for the possibility that they may be divested of Android (or at least to decouple in meaningful ways [1]).

[0]: https://www.androidauthority.com/google-not-killing-aosp-356...

[1]: https://www.bloomberg.com/news/articles/2024-11-18/doj-will-...

◧◩
344. squigz+oZ1[view] [source] [discussion] 2025-07-25 15:34:42
>>jrexil+LE
https://grapheneos.org/donate

If you want it to stay free

◧◩
346. Androm+g12[view] [source] [discussion] 2025-07-25 15:41:57
>>user07+vW
Not a dev, but legacy extended support means that there are no more feature updates, i.e., no new Android versions or QPRs, only AOSP security backports. Obviously there aren't any firmware patches either, as these devices are unsupported by the manufacturer, who is responsible for delivering any changes to the firmware.

https://grapheneos.org/faq#device-support:~:text=The%20follo....

◧◩◪◨⬒⬓
354. Androm+f52[view] [source] [discussion] 2025-07-25 16:01:22
>>bernou+Gm1
> you can still get identified and tracked even if you use a VPN

Sure, but that requires additional data about the user, which the GrapheneOS update server doesn't get. Both the update client and the update server are open source, so you can verify any of what I'm saying. The server only sees the user's IP address, which device model they're requesting an update for, and which update channel (alpha/beta/stable) they are using. The HTTP headers, etc. for the request would be identical across any GrapheneOS device, as they use the exact same updater app.

https://github.com/GrapheneOS/releases.grapheneos.org https://github.com/GrapheneOS/platform_packages_apps_Updater

> First, he is under no obligation to spend hours learning how GOS updates

That literally takes a few minutes to look up, it's all really well documented on the official website. https://grapheneos.org/faq#default-connections

But yes, I do believe that he's obliged to do some research before putting out such absurd claims entirely based on speculation with no technical knowledge or understanding.

◧◩
357. Androm+d82[view] [source] [discussion] 2025-07-25 16:16:17
>>maelit+J81
Yes, GrapheneOS has always offered OTA updates via the System Updater app. https://grapheneos.org/usage#updates It's set up to download and install updates automatically by default. Alternatively, you can install a signed update package via adb sideload. https://grapheneos.org/usage#updates-sideloading

Both the update client and the backend are open source, just like the rest of the system: https://github.com/GrapheneOS/platform_packages_apps_Updater https://github.com/GrapheneOS/releases.grapheneos.org

◧◩◪◨⬒⬓⬔
360. bernou+L92[view] [source] [discussion] 2025-07-25 16:25:26
>>Androm+f52
> That literally takes a few minutes to look up, it's all really well documented on the official website. https://grapheneos.org/faq#default-connections

Again, that is beyond the point. The developer going rogue (for arbitrary reason) and turning the code malicious is not impossible.

> That literally takes a few minutes to look up, it's all really well documented on the official website. https://grapheneos.org/faq#default-connections

All of you who keep commenting "But it's so easy, just look it up" are lacking consideration and empathy. Other people don't think like you, they don't have to think like you. Just the documentation you have linked has so many technical terms, someone not familiar with networking and system design will barely make any sense of it.

It is a also a matter of trust. After the developer express their hostility multiple time, even if someone was willing to go through it, what if the documentation is not forth coming ? It is within the devs control after all. How does one even make sure that the software does what the documentation says it does ? etc...

> But yes, I do believe that he's obliged to do some research before putting out such absurd claims entirely based on speculation with no technical knowledge or understanding.

What "absurd" claim did he put out exactly ? His issue was never about the technical aspects of GOS. It was about the broken trust and the perception that using software from a hostile developer was a risk factor, hence his stopping using it (at least on his devices with sensitive info).

◧◩◪◨
364. Androm+Oa2[view] [source] [discussion] 2025-07-25 16:30:32
>>gf000+BY
GrapheneOS published a workaround for that in an update in January. https://grapheneos.org/releases#2025012600

https://grapheneos.social/@GrapheneOS/114772578787013282

◧◩◪
371. Androm+Ob2[view] [source] [discussion] 2025-07-25 16:37:19
>>labada+LI1
> How do push notifications and similar things work on GraphenOS?

Some apps require Google's FCM for push notifications. You need to install Sandboxed Google Play services from the GrapheneOS App Store and grant them unrestricted battery access (so they can run in the background, which is required for maintaining a network connection to FCM and delivering notifications). https://grapheneos.org/faq#notifications

Other apps like Signal use their own background connections, for example WebSockets, to deliver push notifications, but keeping a connection open for each app consumes more battery life than just having one background network connection. Also, not every app supports this.

For Signal specifically, the GrapheneOS project recommends either using FCM via Sandboxed Google Play, or installing Molly (https://molly.im/), a fork of the Signal client for Android, which makes some changes to reduce battery consumption when using WebSocket-based notifications. It also allows you to use UnifiedPush (https://unifiedpush.org/) for notifications instead, but that requires an application called mollysocket (https://github.com/mollyim/mollysocket) running on a server.

◧◩
379. mbanan+zc2[view] [source] [discussion] 2025-07-25 16:41:32
>>VladVl+SA
Anything 8th gen and later would be best, as those models support MTE which is a huge security feature not present on 6th or 7th gen hardware.

Our recommended devices can be found here:

https://grapheneos.org/faq#recommended-devices

◧◩◪
382. maelit+we2[view] [source] [discussion] 2025-07-25 16:50:53
>>timsch+xg1
> For the S10 a mandatory wipe-on-upgrade has last been the case when upgrading from versions _older than LineageOS 21.0_.

Ah, that might be it. My current version is 21.

> If your device is running LineageOS version older than 21.0, wipe your data partition (this is usually named “Wipe”, “Format”, or “Factory reset”) .

https://wiki.lineageos.org/devices/beyond0lte/upgrade/

Yes ! Thank you, I can upgrade to 22 without wiping.

◧◩◪
391. anthk+lg2[view] [source] [discussion] 2025-07-25 16:59:24
>>Ros23+US
Join usenet: https://www.eternal-september.org

Subscribe to comp.mobile.android. Sadly there's no libre client yet, but Mozilla might release a Thunderbird version with NNTP support.

◧◩◪
405. strcat+8n2[view] [source] [discussion] 2025-07-25 17:30:39
>>Ros23+US
We use Flarum as our forum software for https://discuss.grapheneos.org/. Flarum supports viewing all of the content without JavaScript via an HTML fallback mode using pagination. Flarum simply informs people they'll have a better experience with JavaScript enabled.
413. ciferk+Wx2[view] [source] 2025-07-25 18:23:53
>>madars+(OP)
Really feel a similar sentiment to a lot of others in the comments! I'm enjoying the recommendations other shared here. I _think_ this follows the rules of conduct for HN but let me know, I recently brained dumped about the following on my blog about the general experience setting up GrapheneOS: https://blog.matthewbrunelle.com/i-picked-a-really-weird-tim...
◧◩◪◨⬒⬓
415. mixmas+1z2[view] [source] [discussion] 2025-07-25 18:29:06
>>strcat+ef2
Purism uses U-Boot on the Librem5 and modified coreboot (in other places) I believe.

https://docs.u-boot.org/en/latest/board/purism/librem5.html

◧◩◪◨
419. ysnp+cD2[view] [source] [discussion] 2025-07-25 18:50:18
>>ndrisc+Nm1
Vanadium implements per-site content filtering as a usability feature via Chromium's in-built filtering engine [0]. They currently use EasyList & EasyPrivacy filters which are quite popular and also a prominent default in uBlock Origin [1].

[0] https://grapheneos.org/features#vanadium

[1] https://github.com/gorhill/uBlock?tab=readme-ov-file#ublock-...

◧◩◪
421. strcat+eD2[view] [source] [discussion] 2025-07-25 18:50:21
>>Commen+9A1
The same thing could be said about any hardware. Pixels receive by far the most privacy and security research of any devices. They're by far the most secure Android devices and the only ones providing competitive security with iPhones. They're the only devices with even a reasonable level of security combined with proper alternate OS support. Our hardware requirements are listed at https://grapheneos.org/faq#future-devices. These are very reasonable requirements for industry standard security features, standard updates and the ability for GrapheneOS to use those standard security features. There are other devices with all the major features listed there but not the ability for GrapheneOS to use all of them. Updates are a major issue for all non-Pixel Android devices including the ones advertising lengthy support.

GrapheneOS is working with a major Android OEM towards their future devices providing the expected hardware-based security features and updates, unlike their current devices. The purpose of GrapheneOS is not specifically avoiding Google but if you want hardware from another large tech company to use with GrapheneOS, you'll have that option. The initial goal for these devices is providing a similar level of security and long term support to what we already have with Pixels. In the longer term, we want to have add hardware-based security features unavailable on Pixels or iPhones along with hardening below the OS layer.

For now, Pixels are the only viable option for us to use. We're actively working on changing that but we're not going to simply greatly lower our standards and support devices where we can't adequately protect users. There's no evidence of any backdoor and it's contradicted by how exploits are developed and used. There is plenty of evidence that other devices lack comparable security.

https://discuss.grapheneos.org/d/14344-cellebrite-premium-ju... shows an example where only the Pixel 6 and later / iPhone 12 and later have brute force protection which holds up against the most sophisticated company developing forensic data extraction tools. We have access to more recent documentation showing the same thing.

Why do governments buy exploit tools from NSO, Cellebrite, etc. and develop their own if they supposedly have backdoors in devices? Why would using a device from Samsung or Sony protect against it if they did?

◧◩◪
422. strcat+hE2[view] [source] [discussion] 2025-07-25 18:55:47
>>NotPra+dJ1
See the response at >>44686811 .
◧◩◪◨⬒⬓⬔⧯▣
423. bernou+jE2[view] [source] [discussion] 2025-07-25 18:55:49
>>Androm+hx2
> It's objectively clear though, that this is a very low quality video full of baseless speculation, and severely lacking any technical understanding and knowledge.

"Baseless" could not be further away from the truth. You literally have the GOS developer messages coming in live while he rehashes frivolous accusations and threatening to exposing him. To claim objectivity, when you seem to cherry pick the parts of the video that would (loosely) fit your narrative. Where is your evidence that Rossmann is in anyway associated to harassment campaign against the project ?

> This is exactly the same as going to a restaurant, having an argument with the owner, and then claiming that they might be putting poison in the food, even though there's absolutely zero evidence or anything that might indicate that, solely because you had a disagreement with someone and now want to harm their reputation.

Damn, so close, you were almost there. A more accurate analogy you could have come up with, had you actually critically listened to Rossmann's argument in his video. Yes, it's like going to a restaurant and having a disagreement with the cook, for the latter to explicitly threaten to harm onto you. At that point, is it that far fetched to think he might poison the food ? When you know he has full control over the kitchen ?

You can disagree with Rossmann perception of the actual threat, but you should at least admit that it is not absurd for Rossmann to think that someone who demonstrated such irrational behavior might attempt to harm in through the means at their disposal, among which introducing malicious code. It might be unlikely given what we know about software dev, but it is not impossible, and for Rossmann, that is the only thing that matters at the end of the day.

Moreover, the GOS dev himself clearly stated he would "publicly expose him" (At 2:14 in https://youtu.be/4To-F6W1NT0?t=134 "and there will be information published about your (Rossmann) attacks on me in support of an abusive person). Why the double standard ? That GOS dev can go around dishing out "reputational harm" but his targets doing the same is not fair game ?

At this point, Rossmann did him a service by publishing everything himself. As far as any reputational harm is concerned, the GOS developer essentially brought it on himself. Could have dropped back when they had the fallout in September 2022, as per the chat logs (<https://www.swisstransfer.com/d/d75ff782-4a7d-4497-b04e-edd1...>) ...

> I would go further and say that it was his intention of harming the project's reputation, but that's just my personal opinion.

Sure, "harm the reputation of the project" when he was proactively giving them no string attached grants, spreading the word, and giving them an opportunities to tell their side of the story ...

> I'm quite certain that there are more people than just me, who think that someone with close to two million subscribers on YouTube should fulfill due diligence by doing some basic research and at least read the extensive official documentation that's provided, before putting out a video with serious allegations and a very high potential of harming someone's reputation.

Then in the first place, perhaps the cyber security geniuses who built a privacy and security oriented OS for smartphone could do the due diligence of gathering and presenting actual evidence of Rossmann implication in the alleged harassment campaign before before posting multiple accusatory statements across their socials media "with serious allegations and a very high potential of harming someone's reputation" ?

◧◩
424. strcat+AE2[view] [source] [discussion] 2025-07-25 18:57:05
>>torium+Q11
See >>44686811 .
◧◩◪
425. strcat+IE2[view] [source] [discussion] 2025-07-25 18:57:45
>>_vere+231
See the response at >>44686895 .
◧◩◪
426. dang+JE2[view] [source] [discussion] 2025-07-25 18:57:49
>>strcat+AE2
Please don't copy-paste comments (>>44686811 ).

Linking is fine, as you did here: >>44686876 .

◧◩◪◨
427. strcat+NE2[view] [source] [discussion] 2025-07-25 18:58:00
>>bitpus+R31
See the response at >>44686895 .
431. Davide+AI2[view] [source] 2025-07-25 19:13:49
>>madars+(OP)
Note that the author of the article has now added "corrections" :

Corrections/elaborations on some points : https://lwn.net/Articles/1031454/

Source: https://grapheneos.social/@GrapheneOS/114914602970489632

> Our community manager has provided a response to the recent LWN article on GrapheneOS with important corrections and context. The article had significant inaccuracies about the history of GrapheneOS, our organization and the details of what we provide. [.................]

◧◩
434. strcat+cM2[view] [source] [discussion] 2025-07-25 19:33:11
>>ajb+RM
Our hardware requirements are listed at https://grapheneos.org/faq#future-devices. There are a small subset of other devices with at least nearly all of the security features we require. However, those devices either don't allow using another OS or cripple security for it. There's no other device providing the listed security features and allowing us to support it. Pixels are also the only devices properly keeping up with current Android OS and security updates. We need ongoing firmware and driver updates. There are other devices offering support for a similar time period, but not actually providing close to the same thing during that time period.

Most OEMs do the bare minimum for security. The security features they provide are the ones provided for them by AOSP, the SoC vendor, etc. They provide delayed and quite incomplete security patches.

Android downplays the fact that it has OS releases every month. There's a new monthly, quarterly or yearly release each month. The monthly Android Security Bulletin patches are a separate thing providing backports of a subset of the security patches (most High and Critical severity AOSP patches) to older initial yearly releases (the initial releases of Android 13, 14, 15 and 16). There are also a huge amount of SoC and other hardware-related security patches with a small subset included in the Android Security Bulletin. Most OEMs struggle to provide these backports and vendor patches on time for a reasonable time period. Non-Pixel OEMs eventually update to a new initial yearly release, usually quite late, then rely on the backports to it for a year or more. Full Android security patches mean shipping the latest stable releases, which have been through significant public testing beforehand for quarterly/yearly releases and are not actually bleeding edge. Quarterly releases are as large as yearly ones but awareness of them existing is low. Android 16 QPR1 currently in Beta has more user-facing changes than Android 16.

We're working with a major Android OEM towards some of their future devices meeting our requirements and providing official GrapheneOS support. It will be their regular devices but meeting our requirements currently only Pixels do. Hopefully available in 2026 or 2027. There's no reason other devices can't provide comparable or better security than Pixels, but it's not easy or cheap.

◧◩
436. strcat+PO2[view] [source] [discussion] 2025-07-25 19:47:00
>>flntzr+jJ1
> I'd like to switch phones soonish and was looking at the fairphone 6 with /e/OS but feel deterred by its mid range specs which would probably limit its longevity. I would like to get away from google.

Fairphones lack proper security patches and OS updates from day one. /e/OS makes this substantially worse compared to Fairphone's own OS. Fairphone tends to lag 1-2 months behind on Android's standard partial security backports and a year or more behind on yearly OS updates. They skip the monthly and quarterly releases. Fairphone 5 uses the Linux 5.4 LTS branch which will be end-of-life in December 2025 with no plan to move away. Older Fairphones use end-of-life kernel branches.

Here's information from the author of the divested projects about /e/OS including data on updates from 2021 up until late 2024:

Issues with /e/OS: https://codeberg.org/divested-mobile/divestos-website/raw/co...

ASB update history: https://web.archive.org/web/20241231003546/https://divestos....

Chromium update history: https://web.archive.org/web/20250119212018/https://divestos....

Chromium update summary: https://infosec.exchange/@divested/112815308307602739

For the Chromium update summary from July 2024, note 128/135 was shipping each update on a given update path. /e/OS only shipped 12/135. They did not ship most Chromium security updates and skipped most releases. They're still skipping many releases and have significant delays for the ones they do ship.

Here's an article from another privacy/security researcher on /e/OS covering some of these issues:

https://www.kuketz-blog.de/e-datenschutzfreundlich-bedeutet-...

As documented there, /e/OS has their own invasive services including user tracking in the update client. https://community.e.foundation/t/voice-to-text-feature-using... is another example where /e/OS sends user data to OpenAI without consent for speech-to-text compared to Apple doing it locally by default and Google at least supporting doing it locally and encouraging enabling it.

There's a third party comparison table at https://eylenburg.github.io/android_comparison.htm with a privacy and security focus. It doesn't currently cover invasive services added by operating systems or privacy/security regressions beyond patch delays though. It covers what is done with most of the standard AOSP services and how Google service compatibility is handled.

> Is waiting for the new pixel and then putting grapheneOS on it a good way forward? Seems weird to pick a google device to get away from that company.

The purpose of GrapheneOS is providing a high level of privacy and security. This requires secure hardware/firmware with important hardware-based security features and driver/firmware patches. Using a Fairphone with /e/OS is nearly the direct opposite of GrapheneOS.

> Alternatively, there is the iPhone but I do like fdroid and the more open nature of android.

An iPhone would be a far better choice for privacy and security than anything with /e/OS.

◧◩◪
438. strcat+SP2[view] [source] [discussion] 2025-07-25 19:52:18
>>bernou+4O1
See >>44687530 .

> Although it is conterintuitive to use a Google device to get away from Google

The purpose of GrapheneOS is privacy and security, not specifically avoiding Google, which is not what privacy is about overall. Many companies including Android OEMs have worse privacy practices.

> Just stay out of the radar of the leadership, they can be a bit abrasive, for the lack of a better expression.

There are a lot of ongoing attacks on the GrapheneOS project and our team including through fabricated stories and spin. People should look into the actual verifiable facts and look at who is being targeted with harassment and bullying. We defend ourselves from this including debunking inaccurate claims about the project and our team.

◧◩◪
442. strcat+r23[view] [source] [discussion] 2025-07-25 20:57:38
>>strcat+q23
AOSP having a regression causing a timestamp to be added somewhere isn't a reasonable justification for blocking security updates. No system without the ability to investigate the cause and determine if it's okay would be reasonable. We would need to finally have early access to new Android releases to test this in advance and have fixes ready to go prior to the stable releases. We do not currently have this early access but will likely obtain it from the OEM we're working with soon. We would still need additional resources to have ongoing testing for this and fixes for any relevant regression that finds. Porting to new releases prior to them being stable and specifically testing this would be needed.

We can't risk introducing a very a fragile system which could result in substantially delayed updates. Our plan for reproducible builds is to provide an opt-in feature where people can select which additional parties they trust to reproduce builds without falling behind significantly. This would solely be for the OS update client and App Store updates. It would not be for other uses of signing such as verified boot which are not designed to handle this. It would a system to verify that signed hashes from other parties have been published for an update. The meaning of that can be defined by these parties reproducing builds, such as how they'll investigate a mismatch and the way they'll determine if it's an issue.

In practice, this would be based on tools we publish for others to use for building and comparing. Similar to the rest, people are trusting the source code and the people who wrote it. Source code is not inherently trustworthy and provides no magical privacy or security properties. Reading the sources does not mean you will find all the vulnerabilities, particularly subtle ones or hidden ones. It clearly doesn't provide that even for extensive audits/review. Why does the Linux kernel have so many serious vulnerabilities being found on a regular basis including ones which are years and even decades old if this approach works?

If you truly believe that I'm insane, why do you think it's reasonable to use code that I wrote or supervise writing as long as the build matches the sources?

> Until at least those points are covered, the centralized trust model of GrapheneOS is a liability and the central keyholder is at high risk of being targeted for manipulation or coercion.

You use many open source projects with far fewer review. GrapheneOS itself is based on AOSP which uses a huge number of open source projects from a huge number of people. The Linux kernel alone has a massive number of contributors and most code has little review. It's filled with vulnerabilities which are found regularly. https://lore.kernel.org/linux-cve-announce/ provides a very flawed overview of this based on what is backported. These devices are compromised in the real world by exploiting vulnerabilities like many of these. Reproducible builds and checking that others have reproduced builds is not actually going to stop a software supply chain attack in practice, which would work within the constraints and use source code. If one of the projects used by AOSP has a backdoor added to the sources, how do reproducible builds help? We'd just be building the code and the backdoor would be reproducible.

> Honestly there is no good solution to these problems right now, and as a security and privacy researcher my best advice today to potentially targeted individuals is don't carry a phone at all, or if you must carry one, keep it in airplane mode whenever possible and do not do anything sensitive on it. Consider QubesOS or AirgapOS for such things.

Computers have closed source hardware and firmware in general. A few small closed source libraries are not significant compared to the overall complexity of the closed source hardware and firmware. Those libraries are easy enough to review. Pixels have debug symbols enabled for them. Reviewing firmware is a larger scale and much harder undertaking. How do you review the hardware itself? Even if the hardware design was fully open source for the SoC including the CPUs, GPUs, MMU and everything else along with the radios and other peripherals, how would you verify that what a chip manufacturer like TSMC produced matches the hardware design?

> If you are fine with centralized control of a phone, and fine with binary blobs controlled by random corpos having God access to your device, but would prefer to eliminate as much proprietary corpotech bullshit as possible, then I would suggest considering CalyxOS which is at least run by a former LineageOS maintainer with a great reputation.

The lead developer of CalyxOS is a former Copperhead employee directly involved in the takeover attempt on GrapheneOS in 2018. You're talking about someone who was a direct participant in doing shady things for Copperhead's CEO going against the ethics of the open source project the company was meant to be supporting including participating in the takeover attempt and then leaving following it.

He was involved in subsequent attacks on GrapheneOS including similar harassment to what you participate in yourself. CalyxOS does not have current Android privacy/security patches. It's still missing the June 2025 patches for Pixel drivers/firmware. It isn't a hardened OS like GrapheneOS with similar privacy or security improvements, and it doesn't maintain all of the standard security model due to the privileged code they add to the OS.

◧◩◪◨⬒
455. matheu+Xh3[view] [source] [discussion] 2025-07-25 22:39:40
>>strcat+Rg2
I agree with you. I think FSF RYF is a pointless certification since firmware isn't going away anytime soon. I'm not a fan of their "it's part of the wiring if you can't upgrade it" compromise either since it doesn't achieve their goals and makes the situation even worse.

It would be nice if the firmware itself was free software so that it could be shipped alongside the Linux kernel, maintained indefinitely and we could customize it however we want. The hardware is supposed to do what we want it to do, not what the manufacturer lets us do.

I don't like the fact every single device out there has entirely separate computers inside them running unknown proprietary software. It feels like our operating systems aren't operating the system anymore, it's like they're just some user app sandboxed away from the real system. This presentation explains what I mean:

https://youtu.be/36myc8wQhLo

It's an imperfect reality. Security by isolation of devices via IOMMU addresses real concerns such as devices being able to access RAM via DMA. It's great that GrapheneOS is doing this.

◧◩◪◨⬒⬓
462. Daviey+As3[view] [source] [discussion] 2025-07-26 00:06:31
>>strcat+ef2
AOSP is coming to an end...

https://old.reddit.com/r/StallmanWasRight/comments/1l8rhon/a...

>>44254540

◧◩◪◨⬒⬓
476. codeth+x54[view] [source] [discussion] 2025-07-26 08:26:18
>>strcat+Ib2
I've heard good things about RethinkDNS but I've been waiting for integration with Tailscale[0], which doesn't sound entirely trivial[1]. :'-(

[0]: https://github.com/celzero/rethink-app/issues/1047

[1]: https://github.com/tailscale/tailscale/issues/12280

◧◩◪◨⬒⬓⬔⧯▣
480. other8+fa4[view] [source] [discussion] 2025-07-26 09:32:05
>>bernou+Dk1
> mentally unstable

It's not appropriate for you to be saying these things.

> Stuxnet only targeted specific Iranian systems, a needle in a hay stack, was spread did not harm random devices across the globe, and stayed mostly undetected. And this was done without "developer access" to the software itself. Is it hard ? Yes. Is it likely (especially given the knowledge of how GOS works) ? Perhaps not. Is it impossible ? Definitely not.

This makes no sense. GrapheneOS is an open source project and anyone can look at the changes made by the project. Even the OS is reproducible and people do check that, apparently, so GrapheneOS would be caught if they were making changes. Like I even found this repository just now after a quick search https://github.com/lucasbeiler/reproducible-builds-grapheneo...

GrapheneOS isn't just some random OS that nobody has heard of. There are lots of eyes on it, so sneaking some backdoor into the OS would be very difficult and extremely stupid. One misstep and the project would be gone. Do you really think Rossmann is worth that? I don't.

> When the lead dev of the OS you use daily threatens to "publicly expose you" as a user, I won't blame said user to stop using the software. And even less, to provide such data point regarding the behavior of that developer.

I've already pointed out in other comments that he had no good reason to fear a targeted update. It's just not possible. He should know that by now, but as far as I know he has never retracted that part of his video.

◧◩◪◨⬒⬓
485. other8+Fd4[view] [source] [discussion] 2025-07-26 10:17:50
>>bornfr+Ls1
> The GOS could snoop on their users and turn into malware only if it figures out that this is Rossmann's phone.

Well, yes, but not really. What you're saying could be true if the OS wasn't open source. It's not some small OS that nobody knows about. There are forks of the OS, there are other projects that selectively copy code/commits from GrapheneOS, there are security researchers who pay attention to its development. There are also people who reproduce and verify builds. It's just not possible for that kind of code to be snuck in there.

This section of the website about whether GrapheneOS is audited is also helpful https://grapheneos.org/faq#audit

> This is what is keeping me from installing GOS too. Interaction from the developers seems very aggressive towards the competing OSs, which doesn't inspire much trust.

If you pay attention to what they're responding to, you'll find that a lot of that is in response to something they said, clarification about inaccuracies in news articles, etc. The official accounts are also followed by many of the OSes' users, so some posts are for them too if certain things are being talked about in the community.

> In the end you need to trust someone, but I'm not sure GOS is more trustworthy than LineageOS (which has a bigger community, more developers and /e/os building on top of them).

I personally prefer quality over quantity. GrapheneOS developers take a long time to develop new features, test them, rewrite them, and it goes on and on until they have a resulting feature that is very high quality. They also have to keep in mind how much they're adding/changing so features and changes can be ported quickly when there are new upstream releases. Updating quickly is very important for security. Leaving vulnerabilities unpatched for months is not acceptable for a project and users who value security. The same can't be said of LineageOS or /e/OS. They're slow to update, roll back security, etc.

◧◩
488. morser+fg4[view] [source] [discussion] 2025-07-26 10:56:57
>>torium+w11
The company you're discussing is... GrapheneOS itself.

> GrapheneOS Foundation was created as a non-profit organization in Canada in March 2023 to handle the intake and distribution of donations. [1]

> GrapheneOS Foundation has been incorporated as a federal non-profit organization in Canada. It will be used to receive donations to pay developers and pay for infrastructure. It will also help to shield developers from attacks through the legal systems across various countries. [2]

[1]: https://grapheneos.org/history/

[2]: https://x.com/GrapheneOS/status/1638648643363258369

◧◩◪◨
504. 1vuio0+u55[view] [source] [discussion] 2025-07-26 19:02:53
>>1vuio0+XP3
When viewing the "Show log" screen in Netguard, under the top right, three dot menu there are checkbox options for "Show names" and "Show organization". Netguard sends requests to ipinfo.io to get information about IP addresses. These requests to ipinfo.io do not show up in the Netguard log.

There is no cause for concern necessarily. These are design choices, nothing more.

Users have no idea what happens to the data that leaves their computers. To quote from another story currently on the HN front page: "It's incredibly easy to give information away. But once that data is out there, it's nearly impossible to take back." >>44689059

Promises made by developers are reassuring to some, but rarely if ever legally enforceable in the event something goes wrong, and the harm already caused may be beyond redress. As a proactive measure users can, among other things, seek to minimise the amount of data they send. For example, some users might want the _option_ to stop their phones from constantly trying to ping or connect to remote servers _without any explicit user intent to do so_. Maybe they do not want their phone to act like a beacon to someone else's remote server.

The point of the comment is that sometimes there are remote connections being made to servers chosen by developers that are assumed to be OK with all users, e.g., connections to Graphene servers, IPinfo servers, or myriad other examples. Meanwhile there is no option for the user to disable this behaviour. There may be some users who prefer _zero_ remote connections except the ones they themselves choose to initiate or enable. The possibility of such users often seems to be overlooked or deliberately ignored.

Like Firefox constantly sending HTTP requests to remote servers to check for "connectivity". Even when the user is not trying to connect to any server. The requests are sent in the clear. This is not optional behaviour.

512. joemaz+KE5[view] [source] 2025-07-27 02:28:18
>>madars+(OP)
GrapheneOS "had" to reply to this article because they weren't happy with it's portrayal of events and LWN refused to edit a live article.

Par for the course with GrapheneOS. They always seem to take a good thing said about them and not be satisfied.

https://x.com/GrapheneOS/status/1948811620047536316

◧◩◪◨
522. Androm+V96[view] [source] [discussion] 2025-07-27 10:54:09
>>1vuio0+XP3
> Except the default browser is Chromium with some changes

Chromium has vastly superior security compared to Firefox. https://madaidans-insecurities.github.io/firefox-chromium.ht...

> It tries to copy Google paternalism > > It swaps a Google mothership for a Graphene mothership

Nonsense claims. All network connections made by the OS are well documented on the official website: https://grapheneos.org/faq#default-connections

There are only a few services GrapheneOS devices connect to:

- a time server (securely, over HTTPS, not insecure NTP)

- the OS update server (obvious; it's just plain HTTP requests, no user identifiers other than the IP address, which can easily be masked by using Tor or a VPN)

- the GrapheneOS App repository, which provides updates for preinstalled apps like Auditor, as well as the Vanadium browser and WebView (it's critical to get security patches for your browser in a timely manner)

- network connectivity checks (required to sign in to public wifis that use captive portals; can be entirely disabled in the settings)

- SUPL and PSDS through GrapheneOS proxies for A-GNSS because there is no network location service enabled by default

> Can connections to Graphene servers be blocked, i.e., are these connections optional or mandatory

You can block all the connections. You don't even need to, since they can all be disabled in the settings. If you disable the System Updater app, you're gonna have to adb sideload your system updates https://grapheneos.org/usage#updates-sideloading.

> If the concern is apps that only require internet connection for ads, Netguard solves that problem without root

You don't need Netguard, GrapheneOS has a built in network permission toggle, which offers even better protection than a firewall, since it completely blocks access to the underlying network socket (https://grapheneos.org/features#network-permission-toggle)

> The user-hostile design of Android is that apps keep running in the background after they are "closed"

You can deny apps running in the background, even on stock Android. This isn't unique to Android btw, I'm sure you've come across the system tray in Windows before. Those are all apps running in the background. Android basically has the same thing, it's in the notification center, and you can also stop background apps from there.

◧◩◪◨⬒
523. Androm+3a6[view] [source] [discussion] 2025-07-27 10:56:44
>>reinco+7x4
I think they were talking about the Netguard app (not a part of GrapheneOS or anything) using IPinfo.

GrapheneOS definitely doesn't use it. It doesn't contact any third-party APIs. Everything is well documented: https://grapheneos.org/faq#default-connections

◧◩◪◨⬒⬓
527. reinco+yg8[view] [source] [discussion] 2025-07-28 08:09:40
>>Androm+3a6
Thank you for sharing the info.

In both cases, they could opt to download our database locally and use it through their own API system.

We sponsor the AlmaLinux Foundation through a data sponsorship for their mirroring system: https://almalinux.org/blog/2024-08-07-mirrors-1-to-400/

But since privacy is a major concern for them, they should just use our IP-to-country database and host an API themselves on top of it: https://ipinfo.io/lite

We are happy to support and be part of any software that want to use our data.

◧◩◪◨⬒⬓⬔
528. Androm+sI8[view] [source] [discussion] 2025-07-28 12:31:30
>>reinco+yg8
I was able to confirm that NetGuard actually uses the IPinfo API. See https://github.com/M66B/NetGuard/blob/master/FAQ.md#:~:text=... and https://github.com/M66B/NetGuard/blob/31652781967a70efaee2eb....

I agree that it would be a more privacy-friendly solution for them to host their own API, but that got me thinking, wouldn't it be possible to just let users download the IPinfo data and use it locally? Does IPinfo offer database downloads? That's also how the Server-Status Firefox extension (https://github.com/tdulcet/Server-Status) works (but it doesn't use IPinfo). Also asking for potential personal use: How does the quality of IPinfo data compare to MaxMind, DB-IP, etc?

◧◩◪◨⬒⬓⬔⧯
531. ThePow+Kbe[view] [source] [discussion] 2025-07-30 05:59:19
>>Commen+UA1
https://grapheneos.org/features#sandboxed-google-play
◧◩◪◨⬒⬓⬔⧯
533. reinco+67i[view] [source] [discussion] 2025-07-31 14:54:30
>>Androm+sI8
Apologies for the late response. It's awesome to see they're using our data. I did not know that.

> wouldn't it be possible to just let users download the IPinfo data and use it locally? Does IPinfo offer database downloads?

Of course, you can download our free IP database right now: IPinfo Lite

https://ipinfo.io/lite

> Also asking for potential personal use: How does the quality of IPinfo data compare to MaxMind, DB-IP, etc?

We are miles ahead of everyone in terms of accuracy. Currently, we have 1,100+ PoPs across the world running active measurements. While traditional IP geolocation services are no much more than ASN/ISP reported data aggregation and parsing services. Our priority above all is accuracy and at this moment we are likely the industry leader for that.

If you have the time, go through some of our posts in our community and you will be surprised how good our data is right now. I will share my recent favorite one:

https://community.ipinfo.io/t/the-north-korean-gamers-on-ste...

◧◩◪◨⬒
535. 1vuio0+9Al[view] [source] [discussion] 2025-08-01 17:20:12
>>1vuio0+u55
Traditionally Windows allowed applications to be either minimized or closed. (AFAIK it still does.) These options might be displayed as buttons in the upper right corner of the window in which the application is running, for example, [-] and [x], respectively. When an application is minimized, it may continue to run in the background. When an application is closed, it does not run in the background.

https://www.zdnet.com/article/3-ways-to-stop-android-apps-ru...

https://www.androidpolice.com/how-to-close-android-apps/

https://www.androidauthority.com/how-to-close-apps-on-androi...

An exception would be Windows applications that can be "run as a service". This is generally not default behaviour for user-installed Windows applications. It generally requires administrative privileges and manual configuration for each application

https://en.wikipedia.org/wiki/Windows_service

https://stackoverflow.com/questions/3582108/create-windows-s...

https://www.windowscentral.com/how-start-and-stop-services-w...

Unlike Windows, Android does not present an option to close an application while the application is in view. Android applications can be "swiped off" the screen, but they are not closed. By default, _all_ Android applications continue to run in the background. Closing an application in Android requires using a separate app. For example, opening the "Settings" app, then finding the app to be closed in a list of apps, then "stopping" the app by selecting "Force stop" as describeed in the articles above. If the Android user wants to close a number of applications running in the background simultaneously, she is out of luck. They can only be closed serially, one after the other. She must find each of them via the Settings app and Force stop each one, individually. This is extremely tedious and slow and, as one would expect, results in almost all Android users allowing applications to run in the background. The tedium mandated by this design could be purely coincidental.

[go to top]