GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by GrapheneOS (grapheneos@grapheneos.social)

  1. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:27 JST GrapheneOS GrapheneOS

    GrapheneOS similarly not supposed to prevent authorized access to data by someone with the PIN/password and access to the device. Rather, we provide far stronger protection against unauthorized access via exploit protections, 2-factor fingerprint unlock, duress PIN/password, etc.

    In conversation about 12 hours ago from grapheneos.social permalink
  2. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:26 JST GrapheneOS GrapheneOS

    Not being immune to exploitation doesn't mean it can be successfully exploited in a given real world scenario. It's significantly harder to develop and deploy an exploit successfully. It can be exploited, but it doesn't mean it is happening especially at scale or consistently.

    In conversation about 12 hours ago from grapheneos.social permalink
  3. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:25 JST GrapheneOS GrapheneOS
    in reply to

    Having far from perfect security does not mean real world attacks including sophisticated ones will be successful in practice. Don't fall for security nihilism propaganda. We'll keep working on advancing security for general purpose computing devices. It will keep getting better.

    In conversation about 12 hours ago from grapheneos.social permalink
  4. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:24 JST GrapheneOS GrapheneOS
    in reply to

    Here's an article from Citizen Lab on how the Spanish government used exploits against political opponents in Catalonia:

    https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/

    Bear in mind even police using these will almost entirely be using them against people not convicted of a crime based on suspicion.

    In conversation about 12 hours ago from grapheneos.social permalink
  5. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:07 JST GrapheneOS GrapheneOS
    in reply to

    GrapheneOS is not immune to exploitation, but the fearmongering done in these ongoing attacks on it is very clearly fabricated. They feel threatened enough by GrapheneOS to engage in coordinated attempts at convincing people that it's unable to protect their privacy and security.

    In conversation about 12 hours ago from grapheneos.social permalink
  6. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:06 JST GrapheneOS GrapheneOS
    in reply to

    GrapheneOS eliminates many classes of remotely exploitable vulnerabilities and makes the vast majority far harder to exploit. It even puts up a strong fight against attacks advanced forensic data extraction tools with physical access. See https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation for an example.

    In conversation about 12 hours ago from grapheneos.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: discuss.grapheneos.org
      Cellebrite Premium July 2024 documentation - GrapheneOS Discussion Forum
      GrapheneOS discussion forum
  7. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:05 JST GrapheneOS GrapheneOS
    in reply to

    This same thing is currently ongoing across several Swedish forums and on social media. It's generally not in English which makes it inaccessible to the broader GrapheneOS and privacy community so they can get away with extraordinary, unsubstantiated claims much more easily.

    In conversation about 12 hours ago from grapheneos.social permalink
  8. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:05 JST GrapheneOS GrapheneOS
    in reply to

    There's currently an example of one of these attacks on the project ongoing across Swedish forums and social media. This reached our forum at https://discuss.grapheneos.org/d/23535-unsubstantiated-claims-about-sweden-exploiting-grapheneos-with-no-evidence. An account pretending to be just asking questions goes on to pretend to be an expert citing non-existent sources.

    In conversation about 12 hours ago from grapheneos.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: discuss.grapheneos.org
      Unsubstantiated claims about Sweden exploiting GrapheneOS with no evidence - GrapheneOS Discussion Forum
      GrapheneOS discussion forum
  9. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:04 JST GrapheneOS GrapheneOS
    in reply to

    GrapheneOS is not supposed to stop people installing malware and granting it invasive permission. It does provide alternatives to being coerced into granting invasive permissions by apps via our Storage Scopes, Contact Scopes and other permissions, but it's a user choice.

    In conversation about 12 hours ago from grapheneos.social permalink
  10. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Saturday, 05-Jul-2025 03:36:03 JST GrapheneOS GrapheneOS

    Our features page at https://grapheneos.org/features provides an overview of how GrapheneOS improves privacy, security and other areas compared to the most secure Android devices running the stock OS. It's not immune to exploitation and cannot be. Products making that claim are scams.

    In conversation about 12 hours ago from grapheneos.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: grapheneos.org
      GrapheneOS features overview
      from @GrapheneOS
      Overview of GrapheneOS features differentiating it from the Android Open Source Project (AOSP).
  11. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:57 JST GrapheneOS GrapheneOS

    Android regularly adds and splits permissions for new API levels. Legacy apps are handled by treating them as requesting the permission to provide a toggle for it. For example, Android 13 converted the existing toggle for disabling notifications for an app into a new POST_NOTIFICATIONS permission.

    In conversation about a day ago from grapheneos.social permalink
  12. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:56 JST GrapheneOS GrapheneOS
    in reply to

    Nearly all apps are unaware of these non-standard permissions just as they're unaware of new permissions added by Android before they get upgraded. Therefore, we enable them by default for compatibility but provide the ability for users to disable them at install time like the standard permissions.

    In conversation about a day ago from grapheneos.social permalink
  13. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:56 JST GrapheneOS GrapheneOS
    in reply to

    The Android Open Source Project has infrastructure for this since it's a regular part of the app sandbox and permission model improving. We add Network and Sensors permission toggles in GrapheneOS where Network is based on the existing low-level INTERNET permission and Sensors is entirely new.

    In conversation about a day ago from grapheneos.social permalink
  14. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:55 JST GrapheneOS GrapheneOS
    in reply to

    For Network, apps request INTERNET, so we provide a toggle for rejecting that request in the initial app install dialog. If it's added in an upgrade, it's disabled by default. For Sensors, apps don't request it so we handle it similarly to how Android handled POST_NOTIFICATIONS for existing apps.

    In conversation about a day ago from grapheneos.social permalink
  15. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:54 JST GrapheneOS GrapheneOS
    in reply to

    When Network is disabled, we act as if the network is down for compatibility. We won't run network-dependent jobs, various APIs will report it as down and we give errors matching it being down. When Sensors is disabled, sensors not covered by standard permissions give zeroed data and no events.

    In conversation about a day ago from grapheneos.social permalink
  16. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:53 JST GrapheneOS GrapheneOS
    in reply to

    For usability, apps trying to use those sensors when Sensors is disabled will trigger a notification from the OS which can be disabled on a per-app basis. This informs users about what's going on so they'll know the app is either doing something sketchy or that it may actually require it.

    In conversation about a day ago from grapheneos.social permalink
  17. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:52 JST GrapheneOS GrapheneOS
    in reply to

    F-Droid has an incorrect approach to installing apps which wrongly warns users about the standard Android POST_NOTIFICATIONS permission, our OTHER_SENSORS permission and previous Android permission additions/splits. They wrongly blamed GrapheneOS and didn't fix it:

    https://archive.ph/MtB2J

    In conversation about a day ago from grapheneos.social permalink
  18. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:51 JST GrapheneOS GrapheneOS
    in reply to

    They're now realizing that it happens with standard Android permissions added / split in new releases. Their approach to installing apps has been incorrect in multiple ways for many years and this is one of them. Their approach to listing which permissions are used by apps is also very incorrect.

    In conversation about a day ago from grapheneos.social permalink
  19. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Friday, 04-Jul-2025 03:21:50 JST GrapheneOS GrapheneOS
    in reply to

    F-Droid has a long history of denying issues including covering up serious security flaws. In some cases they eventually ship a fix but still deny it. It's a major factor in why F-Droid is not a safe or trustworthy source of apps due to major security issues not being acknowledged or addressed.

    In conversation about a day ago from grapheneos.social permalink
  20. Embed this notice
    GrapheneOS (grapheneos@grapheneos.social)'s status on Thursday, 03-Jul-2025 03:22:07 JST GrapheneOS GrapheneOS
    in reply to

    There are ongoing coordinated attempts at misleading people about GrapheneOS and Signal in multiple European countries. A consistent pattern are completely unsubstantiated claims about exploits with no evidence. These are contradicted by actual evidence, leaks and their behavior.

    In conversation about 2 days ago from grapheneos.social permalink
  • Before

User actions

    GrapheneOS

    GrapheneOS

    Open source privacy and security focused mobile OS with Android app compatibility.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          99224
          Member since
          17 Feb 2023
          Notices
          363
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.