<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2024-08-02T07:05:51Z</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by final [GrapheneOS] 📱👁️‍🗨️</title>
  <author>
    <name>final [GrapheneOS] 📱👁️‍🗨️</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub1c9d95evcdeatgy6dacats5j5mfw96jcyu79579kg9qm3jtf42xzs07sqfm.rss" />
  <link href="https://nostr.ae/npub1c9d95evcdeatgy6dacats5j5mfw96jcyu79579kg9qm3jtf42xzs07sqfm" />
  <id>https://nostr.ae/npub1c9d95evcdeatgy6dacats5j5mfw96jcyu79579kg9qm3jtf42xzs07sqfm</id>
  <icon>https://image.nostr.build/d837117ca56e292d9f16143a673f47fdb0c3f7273573a2394b1892b3c8c8a688.jpg</icon>
  <logo>https://image.nostr.build/d837117ca56e292d9f16143a673f47fdb0c3f7273573a2394b1892b3c8c8a688.jpg</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqspcaha89ckvjw045536qm0u72rerljtdvv3e5vq4y62ukdsmcvkmczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fqmqcq</id>
    
      <title type="html">We&amp;#39;ve published an initial experimental release for the Pixel ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspcaha89ckvjw045536qm0u72rerljtdvv3e5vq4y62ukdsmcvkmczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fqmqcq" />
    <content type="html">
      We&amp;#39;ve published an initial experimental release for the Pixel 9 Pro Fold on our staging site:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://staging.grapheneos.org/releases#comet-stable&#34;&gt;https://staging.grapheneos.org/releases#comet-stable&lt;/a&gt;&lt;br/&gt;&lt;a href=&#34;https://staging.grapheneos.org/install/web&#34;&gt;https://staging.grapheneos.org/install/web&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Our preordered Pixel 9 Pro Fold for our device testing farm hasn&amp;#39;t arrived yet so we&amp;#39;ll be relying on others to test the early builds.&lt;br/&gt;&lt;br/&gt;Everything from #GrapheneOS been ported for it already and there&amp;#39;s nothing else to do for it without testing feedback from users. There&amp;#39;s a high chance everything is already fine for it since we have production quality support for the other 9th gen Pixels and the original 7th gen Pixel Fold.
    </content>
    <updated>2024-08-30T09:51:37Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs829ey8hp4axruxtyzhg4na9jvrv4jssafddhhxsua4msues74wlqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2pkevf2</id>
    
      <title type="html">New Auditor update with Pixel 9 Pro Fold support. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs829ey8hp4axruxtyzhg4na9jvrv4jssafddhhxsua4msues74wlqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2pkevf2" />
    <content type="html">
      New Auditor update with Pixel 9 Pro Fold support.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/GrapheneOS/Auditor/releases/tag/84&#34;&gt;https://github.com/GrapheneOS/Auditor/releases/tag/84&lt;/a&gt;
    </content>
    <updated>2024-08-29T22:01:08Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswdnrgl3plykxd7sf8j3kwxw0n4vwj2xhf3z9w9ntqnfmngs0xpyczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20h6p7a</id>
    
      <title type="html">Next release for 9th generation Pixels will have further ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswdnrgl3plykxd7sf8j3kwxw0n4vwj2xhf3z9w9ntqnfmngs0xpyczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20h6p7a" />
    <content type="html">
      Next release for 9th generation Pixels will have further hardening with RANDSTRUCT enabled for the kernel with a deterministic seed (the commit timestamp).&lt;br/&gt;&lt;br/&gt;RANDSTRUCT randomizes the order of data structures and function pointer tables at compilation based on a seed, so exploits need to be catered to specific seeds. We&amp;#39;ve made it deterministic to preserve #GrapheneOS reproducible builds by using the hash of the commit date as a seed so it changes the layouts with each base kernel change and we can make it per-device-model later too.&lt;br/&gt;&lt;br/&gt;When other devices get Kernel 6.1 (the upstream is in testing) it can be possible for them to get it too.
    </content>
    <updated>2024-08-29T21:21:33Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz4fnskgddq2qr68wt963w3n9eacz7tu605yvl4cpzuedkpct802gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2j78cja</id>
    
      <title type="html">Great article from well known cryptographer Matthew D. Green ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz4fnskgddq2qr68wt963w3n9eacz7tu605yvl4cpzuedkpct802gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2j78cja" />
    <content type="html">
      Great article from well known cryptographer Matthew D. Green about Telegram per recent events&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/&#34;&gt;https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/&lt;/a&gt;
    </content>
    <updated>2024-08-26T16:31:50Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz6tnlyks35lknyhrl5v0d764tgdwa2grssqz5kg2up4qejfjmexqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20c8ean</id>
    
      <title type="html">SimpleX is the gold standard here. Signal is mentioned here since ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz6tnlyks35lknyhrl5v0d764tgdwa2grssqz5kg2up4qejfjmexqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20c8ean" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrmhej4x06kv9gzzxmn639fvtq3fhcxhqhu45w79yxkw0guv0kmqsnvxgst&#39;&gt;nevent1q…xgst&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;SimpleX is the gold standard here. Signal is mentioned here since they were the subject of Telegram&amp;#39;s campaigns. I would absolutely suggest SimpleX above anything else. 
    </content>
    <updated>2024-08-26T15:35:41Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszl0vmvy4l2wkfy4c0jy5fxz4wdfw2r0cq334fh22esu9ljff358qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2h8a342</id>
    
      <title type="html">Can&amp;#39;t really be sure if it is gone, it&amp;#39;s gone. Users ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszl0vmvy4l2wkfy4c0jy5fxz4wdfw2r0cq334fh22esu9ljff358qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2h8a342" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsznhhu8guylvgl436d9ze7ckt5x0vtrqs4f6pejlasdu5ep7mzmmsx2k6l6&#39;&gt;nevent1q…k6l6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Can&amp;#39;t really be sure if it is gone, it&amp;#39;s gone. Users should just hope for the best.&lt;br/&gt;&lt;br/&gt;Deleting account on it&amp;#39;s own would not delete their messages, they need to do that themselves, either by clearing DMs for both individuals or erasing their messages. If they want to delete their account, they should do that first. It&amp;#39;s a user&amp;#39;s choice to do that.
    </content>
    <updated>2024-08-26T15:30:25Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz35szcfj2505hvc6q6vzazk0mrr48fx04e55rfcmn743088fu00qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2r7cdaj</id>
    
      <title type="html">Using GrapheneOS without one AND aeroplane mode enabled (which ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz35szcfj2505hvc6q6vzazk0mrr48fx04e55rfcmn743088fu00qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2r7cdaj" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqvd5tv9xlp8cxk0wudt70mkudc9wacxs0ekztd8ntkjn56kjaz2g7ad7yn&#39;&gt;nevent1q…d7yn&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Using GrapheneOS without one AND aeroplane mode enabled (which turns off the cellular radio) is more secure since you are reducing remote attack surface from the cellular radio, SMS and others. SIM card is just used as authentication to that network and you are still taking part in it so you need both. Even if you have a SIM, using Aeroplane Mode but still using WiFi except when you need data is good practice (you&amp;#39;re still connecting to your mobile network provider for WiFi calling and more). This also helps against cellular network tracking.&lt;br/&gt;&lt;br/&gt;This has a huge usability cost for some users. High risk individuals are expected to disable radios (Bluetooth, UWB, WiFi, Cellular) when they aren&amp;#39;t using them. It&amp;#39;s an added measure from people with added caution.&lt;br/&gt;&lt;br/&gt;Obviously messengers like Signal are out of the question with no phone number, so SimpleX is the first choice for this.
    </content>
    <updated>2024-08-26T15:27:58Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqarj0krjgw0y7yj3pjr5akqypd9uq7zazths7yaqeuhaztpamv4gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc257zvmy</id>
    
      <title type="html">Matrix has issues with metadata, cryptography and numerous issues ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqarj0krjgw0y7yj3pjr5akqypd9uq7zazths7yaqeuhaztpamv4gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc257zvmy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf4p4t9km0rtm06w4r48lkujara3fkqpjal0ugd4j5n3x383f2v8clq7vh7&#39;&gt;nevent1q…7vh7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Matrix has issues with metadata, cryptography and numerous issues with stability. E2EE is default for DMs which is good, for big rooms with tens of thousands of people it is irrelevant anyways. We don&amp;#39;t use E2EE on the public GrapheneOS rooms as it scales poorly.&lt;br/&gt;&lt;br/&gt;We have some of the largest communities on all of Matrix and we have had to make new rooms numerous times due to stability issues and state resolution bugs. It can also be very slow on the network and so are the apps. &lt;br/&gt;&lt;br/&gt;The multi-session adds a lot of complexity and cryptographers have told us Matrix have issues because of it.&lt;br/&gt;&lt;br/&gt;See: &lt;a href=&#34;https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/&#34;&gt;https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;There were several earlier rounds of Matrix cryptography vulnerabilities before. See &lt;a href=&#34;https://nebuchadnezzar-megolm.github.io&#34;&gt;https://nebuchadnezzar-megolm.github.io&lt;/a&gt; for one. This has happened repeatedly and we weren&amp;#39;t impressed with their response which downplayed it.&lt;br/&gt;&lt;br/&gt;We still heavily use Matrix ourselves and have our own server but we&amp;#39;re less interested in keeping up with this. It&amp;#39;s hard to move away from a platform with multi-session and both good desktop/mobile clients when most of the options don&amp;#39;t have that and none combine it with great encryption. We&amp;#39;d like to be able to recommend Element/Matrix but it has these above issues and it gives a lot of metadata to each server. In E2EE Matrix rooms, message content and attachments are encrypted, but the server knows the time, sender, etc.&lt;br/&gt;&lt;br/&gt;Still a better choice than Telegram though. As a decentralised service you need to trust your homeserver but that is completely down to you.  I am assuming they act in good faith with this post but it is possible not every homeserver will.&lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2024-08-26T12:22:28Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg7280szjcmzcf8rrh4qrjsf4s2tppapgda03f2wn7ujsp2al8yegzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2t3ged4</id>
    
      <title type="html">Unfortunately the security / privacy campaigning directly ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg7280szjcmzcf8rrh4qrjsf4s2tppapgda03f2wn7ujsp2al8yegzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2t3ged4" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg3w6cxgddh3hra0uvrv3gdsa6nnrcx95jz9v0wcgv5nuck0h9sackyawk6&#39;&gt;nevent1q…awk6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Unfortunately the security / privacy campaigning directly conflict against the developers and people working in the field. Many people who lead the campaign also don&amp;#39;t advocate the right information. When people do care it&amp;#39;s often they&amp;#39;ve done it incorrectly or been fed baseless accusations and scaremongering meant to slowly wear readers down into buying dubious products and software.&lt;br/&gt;&lt;br/&gt;Even if people won&amp;#39;t care about privacy yet, we&amp;#39;ll be here with the work when they start to. There are people who dismissed our work or used something else before coming here, and some of those people are influential and provide noticeable public support now.&lt;br/&gt;&lt;br/&gt;I don&amp;#39;t have hard feelings towards people who either don&amp;#39;t care or don&amp;#39;t like certain projects or even GrapheneOS for whatever reason. If people get in trouble because their narrow-minded attitude thought they were untouchable then it&amp;#39;s on them. They will be lessons for others to not follow their footsteps.&lt;br/&gt;&lt;br/&gt;We win by being better than others.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqspl86upj94rndj3kg0uuvyka3kaa0z59kl7d3wx889stza2rcznvsppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqpqacnkk&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…cnkk&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; You can&#39;t always reach everyone. But, that is okay. The best way we can continue our growth is by evidently being better. What the project has done improved mobile security systematically and has helped the broader landscape of software too from the upstream contributions, bounties and innovations made. The more successes to make, the more attention will come.&lt;br/&gt;&lt;br/&gt;We would still recommend an iPhone above the hundreds of insecure devices out there. I personally find it is a shame that their services are so deeply ingrained to their product, but, hopefully legislation bites their hand. Although, it would make sense a company with such a huge budget and likely extremely talented research teams definitely would have the security posture.&lt;br/&gt;&lt;br/&gt;There are sadly many products marketed as private and secure while in reality being less than simply using an iPhone/Macbook. That&#39;s not to say that Apple does a great job but rather this space is ripe with scammers and charlatans selling misleading products or promoting problematic approaches and software. As for real companies, they always either miss the mark, do something that makes improving the platform harder or they simply do not care. &lt;br/&gt;&lt;br/&gt;Privacy and security is an extremely easy thing to sell and mislead people into believing they have to buy. Companies who&#39;ve talked down on us included people reselling insecure phones with flawed software like device managers with a trivially bypassable duress feature. There&#39;s no point in reasoning with fraudsters. &lt;br/&gt;&lt;br/&gt;There will always be more. People find GrapheneOS and use it from what they find. The ones who use it will hopefully always be the ones who want it and that&#39;s what matters.&lt;br/&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-08-26T08:43:29Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvrne9avln0f2unjxyxvve8h9wkq3hq2903pawdx59umvls7l93aszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2cry5zn</id>
    
      <title type="html">This is not a jab against Telegram hitting them when they are at ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvrne9avln0f2unjxyxvve8h9wkq3hq2903pawdx59umvls7l93aszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2cry5zn" />
    <content type="html">
      This is not a jab against Telegram hitting them when they are at their lows despite what a disappointing amount of users on Twitter have reacted to this with. All of us are GrapheneOS have used it in some way. However, it&amp;#39;s founder being arrested is a very important time to remind people that because messages are not end-to-end encrypted except in a very specific circumstance, many users and average people are at risk. Telegram has almost a billion users and many do not understand this concept. If you hold something sensitive on Telegram and it&amp;#39;s not encrypted, you MUST take appropriate action. This is a PSA to our users who use Telegram because we care about the safety of our users and community. The climate surrounding Telegram is moving towards being hostile, so talking about this is more important than ever.&lt;br/&gt;&lt;br/&gt;There are many messengers not just Signal that are safer than Telegram simply because end to end encryption is mandatory. Signal is mentioned here because they are an unfortunate subject of Telegram&amp;#39;s marketing campaigns. Influencers taking jabs at Signal when they are proven to only be able to provide only a timestamp of when an account was registered and last used in court is simply throwing stones from a glass house. Both require phone numbers yet Telegram gives away far more information about you.&lt;br/&gt;&lt;br/&gt;Encryption and preventing access to metadata doesn&amp;#39;t just protect users, it protects developers. You cannot be compelled to give away what you cannot access and you cannot be accountable to protect against what you aren&amp;#39;t able to moderate. Develop unstoppable software that can survive without you. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://signal.org/bigbrother/santa-clara-county/&#34;&gt;https://signal.org/bigbrother/santa-clara-county/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;We recommend only SimpleX for messaging outside of Signal/Molly at this time. For high risk GrapheneOS users who use it as a WiFi-Only device with no SIM, it is the best choice. Molly also allows multiple devices to use one Signal account, register on another device and link and you still won&amp;#39;t need the number if you need Signal. If Session had PFS it would also be considered further, there is a tradeoff.&lt;br/&gt;&lt;br/&gt;We aren&amp;#39;t in a place and time to assess every communication method available to us, the market for messaging apps is becoming way too large.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsdrspnq5l0q3kjgm8gplyeyrjcdscrwgjj53yz5gmzvjxe9gtmsvcpzpmhxue69uhkummnw3ezumt0d5hsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsv9mcec&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…mcec&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Telegram has full access to all of the content of group chats and regular one-to-one chats due to lack of end-to-end encryption. Their opt-in secret chats use homegrown end-to-end encryption with weaknesses. Deleting the content from the app likely won&#39;t remove all copies of it.&lt;br/&gt;&lt;br/&gt;Telegram has heavily participated in misinformation campaigns targeting actual private messaging apps with always enabled, properly implemented end-to-end encryption such as Signal. Should stop getting any advice from anyone who told you to use Telegram as a private messenger.&lt;br/&gt;&lt;br/&gt;Telegram is capable of handing over all messages in every group and regular one-to-one chat to authorities in France or any other country. A real private messaging app like Signal isn&#39;t capable of turning over your messages and media. Telegram/Discord aren&#39;t private platforms.&lt;br/&gt;&lt;br/&gt;A major example of how Telegram&#39;s opt-in secret chat encryption has gone seriously wrong before: &lt;a href=&#34;https://words.filippo.io/dispatches/telegram-ecdh/&#34;&gt;https://words.filippo.io/dispatches/telegram-ecdh/&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;The practical near term threat is for the vast majority of chats without end-to-end encryption: 100% of Telegram group chats and the regular 1-to-1 chats. &lt;/blockquote&gt;
    </content>
    <updated>2024-08-26T06:09:11Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq2hnxwpwv5v90vs6yxkhupful2x5l94ewsyeqwj8axvhlup7f87qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc22msmc2</id>
    
      <title type="html">Our 4th release for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq2hnxwpwv5v90vs6yxkhupful2x5l94ewsyeqwj8axvhlup7f87qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc22msmc2" />
    <content type="html">
      Our 4th release for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL is now available. It adds two Bluetooth bug fixes missing from the temporary Android Open Source Project branch for 9th generation Pixels. One of those is a Bluetooth issue we reported.&lt;br/&gt;&lt;br/&gt;See more about how #GrapheneOS exploit mitigations help identify vulnerabilities upstream which we report and improve Android security for everyone:&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsgfzs2mw8x3jfz0m3vlwd5pgty2ne9gzw8lpcjkyrrs88pjvnwhlspz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsc39mh4&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…9mh4&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; #GrapheneOS receives third Android Security Acknowledgement from Google this year. This time for a high-severity Bluetooth vulnerability:&lt;br/&gt;&lt;br/&gt;Google has listed the CVE-2024-23694 vulnerability we reported in the security acknowledgements for May 2024: &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://source.android.com/docs/security/overview/acknowledgements&#34;&gt;https://source.android.com/docs/security/overview/acknowledgements&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;This is the Bluetooth issue we found with memory tagging which they assigned a High severity. We fixed this on March 9th. This vulnerability isn&#39;t listed in the baseline Android Security Bulletin despite being an Android Open Source Project issue. It will likely be listed in the Pixel Update Bulletin which should be today with the monthly update of AOSP and the Pixel OS.&lt;br/&gt;&lt;br/&gt;This vulnerability only impacts Android 14 QPR2 and later. It&#39;s possible they only list issues impacting the initial release of Android 14 in Android Security Bulletins and put the rest in Pixel bulletins. It&#39;s odd how Pixel bulletins are mostly issues impacting other devices.&lt;br/&gt;&lt;br/&gt;Last month, Pixels fixed 2 vulnerabilities we reported which were both classified as High severity and were both exploited in the wild by forensic companies to extract data on smartphones. Both also impact non-Pixels but were only fixed for Pixels and listed in the Pixel bulletin.&lt;br/&gt;&lt;br/&gt;We understand why they didn&#39;t list those firmware patches in the Android Security Bulletin (ASB) since other devices with the same issues need their own unique firmware patches for them.&lt;br/&gt;&lt;br/&gt;The AOSP 14 QPR2 Bluetooth big not being listed means ASB is less complete than we thought though. &lt;/blockquote&gt;
    </content>
    <updated>2024-08-26T05:11:32Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspgtjml3w992996qkpuh4ctd5mzed2yn2gtfsq8rxgghxdnqwkpxgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc24zll52</id>
    
      <title type="html">Difficult to count how many people put themselves in trouble by ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspgtjml3w992996qkpuh4ctd5mzed2yn2gtfsq8rxgghxdnqwkpxgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc24zll52" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvkq48mx8aujqduymjxpnmcdxghdrtr9dwpgdhr7z9clqk7hlrpysewtum0&#39;&gt;nevent1q…tum0&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Difficult to count how many people put themselves in trouble by not using the app in the way it should have been used... Recent events cannot make Telegram avoid scrutiny, the criticisms are more important than ever now if things do get worse.
    </content>
    <updated>2024-08-25T15:07:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgmwdlzyughrnu7dq2ja0fa4q5uq4kh6pc5vt9t47mygzj9xqtragzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2l0q5a7</id>
    
      <title type="html">Telegram has serious issues but this is just a common, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgmwdlzyughrnu7dq2ja0fa4q5uq4kh6pc5vt9t47mygzj9xqtragzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2l0q5a7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs03cek9kkwnzzmjvuv799f3hjgr9scwr64xzrn8jklujuhvjqjq5qgyx4f9&#39;&gt;nevent1q…x4f9&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Telegram has serious issues but this is just a common, regurgitated type of scam site, same thing with Instagram &amp;#39;DM viewer&amp;#39; sites.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.trustpilot.com/review/tgtracker.com&#34;&gt;https://www.trustpilot.com/review/tgtracker.com&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Here is a site just like it that doesn&amp;#39;t exist anymore, likely ran by the same people but a new domain.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://web.archive.org/web/20210124115118/http://teletracker.org/&#34;&gt;https://web.archive.org/web/20210124115118/http://teletracker.org/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Anyone selling this capability out in the open wouldn&amp;#39;t be smart.
    </content>
    <updated>2024-08-25T14:50:56Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgqlafk0wc6z6s2w00ldzsyxzh2rv8490h9gchqj4nfn9nwjarhcgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc225a45m</id>
    
      <title type="html">An iPhone and stock Pixel are around the same, but Pixels ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgqlafk0wc6z6s2w00ldzsyxzh2rv8490h9gchqj4nfn9nwjarhcgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc225a45m" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0fykfzsyd4xft256rtwv97p8j266jep4hvq02uuvcg23w5kja83chr9ymw&#39;&gt;nevent1q…9ymw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;An iPhone and stock Pixel are around the same, but Pixels obviously gives you more freedom of apps, while Apple&amp;#39;s online services are arguably better. There are pros and cons. You&amp;#39;re at the bane of either Google or Apple if you use their services. For iPhone, Lockdown Mode exists for added security too but it messes with some browser and messenger functionality. Pixels let you install other OSes safely and easily which is where more private and secure options like ours can be installed onto.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/&#34;&gt;https://grapheneos.org/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;GrapheneOS runs on Pixels because they are the highest security platform commercially available to us. For other Android platforms, Samsung comes close but destroys hardware and security functionality on other OSes by an eFuse so we can&amp;#39;t use them. Most other Android devices are insecure by being slow on updates and patches or with their hardware choices. Google quickly responds to our vulnerability reports while some haven&amp;#39;t even tried to deal with issues we believe affect several other devices that we reported several months ago.&lt;br/&gt;&lt;br/&gt;Pixel 8 and later are the best of them as they have hardware security features like MTE which previous generations don&amp;#39;t have. They also get security updates for 7 years since launch. We are always open to working with other device manufacturers to hopefully go above what Pixel offers, or to provide an alternative. Most times they fall through because they want to do something different. We have strict demands.&lt;br/&gt;&lt;br/&gt;Cellebrite Premium (phone extraction tool exclusive to police) documents say they can do iPhone access on every iPhone on latest iOS while for Pixels they can only hit the stock OS (not GrapheneOS who they DIRECTLY mention) and they cannot brute force the secure element. The stock OS on Pixels does not take full advantage of the security features available to them, like MTE, which is a game changer.&lt;br/&gt;&lt;br/&gt;The Cellebrite docs provide a good insight on what device companies with massive budget have a harder time in exploiting:&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs0nywe3nndmy58zfuezntqpqujr6luz5e6cxg26yfvy9e678ea2kcpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqs0femts&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…emts&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;/div&gt; EXCLUSIVE: Here&#39;s the Cellebrite Premium 7.69.5 iOS Support Matrix from July 2024.&lt;br/&gt;&lt;br/&gt;404media recently published an article based on the same April 2024 docs we received in April and published in May. Many tech news sites including 9to5Mac made incorrect assumptions treating that as current.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/f042276d5b54561f39a1cf73f9e3dc5c0b8946c4744eb7a20445c859fcbdc7c3.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/df75e212117bed9ec8e1ae80c06ac78ab66dd981931a5f2c796803150856fbf9.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/24e57317d9f77fc17bb26485a319e28d02c0f36df2038681acae9d0ebc1c1bcb.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt;Here&#39;s the Cellebrite Premium 7.69.5 Android Support Matrix from July 2024 for Pixels. They&#39;re still unable to exploit locked #GrapheneOS devices unless they&#39;re missing patches from 2022. A locked GrapheneOS device also automatically gets back to BFU from AFU after 18h by default.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/6c2c963377aa75af248e5c4ce646df70f50e1d5eedb2184e4b27f63faffd44ee.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/33551de196f545a14b82051aa2a4a826fb84577821c60f4b9841508fb73af375.jpg&#34;&gt;  &lt;/blockquote&gt;&lt;br/&gt;Obviously it doesn&amp;#39;t completely deny possibility of attacks. Technology is not impenetrable and people who think very powerful organisations is after them need to behave differently too.
    </content>
    <updated>2024-08-25T14:21:51Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy8wezcwm8eufreedc86exc3tngd9g08ekcnq64zmrcpg7rmujk4qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2kpevck</id>
    
      <title type="html">Follow good security practices, update software and use new and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy8wezcwm8eufreedc86exc3tngd9g08ekcnq64zmrcpg7rmujk4qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2kpevck" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr904ng0lte759ktmw6p79dj5288keq8z3njprwtl9ew2r9f7386skpn5kv&#39;&gt;nevent1q…n5kv&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Follow good security practices, update software and use new and secure devices. Don&amp;#39;t install apps or visit places you don&amp;#39;t trust. Less is more, the more you add the more parties you have to trust.&lt;br/&gt;&lt;br/&gt;Use a good messenger like SimpleX. Session has some cons like no perfect forward secrecy, but we give them extra props for being honest about that. Signal is the best mainstream choice by us but Molly is a hardened fork we suggest to users above it. You can get Molly via Accrescent app store which is in the GrapheneOS App Store, so there is a chain of trust between GrapheneOS and Molly. The phone number requirement is a con, but Molly allows running multiple devices on one account so you could even register the number on one device, move to a WiFi-only device and never use the number again.&lt;br/&gt;&lt;br/&gt;Perfect Forward Secrecy means that even if an attacker gets the messages and later compromises your device to get the main decryption keys, they can&amp;#39;t get the messages which no longer have the session keys on your device. Having messages stored on a server inherently is not a major issue providing it is encrypted, though usually most messengers don&amp;#39;t anyway which is favorable. Session not having PFS is a flaw in this front.&lt;br/&gt;&lt;br/&gt;The messenger needs an OS that is secure and up to date. The hardware also needs to be secure and receive patches. Desktop OSes like Windows and many Linux distributions are worse overall since they don&amp;#39;t forcibly sandbox apps. Any other app can just access the data of your messaging app quite easily on these platforms. Assess if needing to share your messages to other devices like desktops are necessary before you choose to do it.&lt;br/&gt;&lt;br/&gt;When using something like a messenger there is always the potential of a sophisticated threat having an exploit for it, the same way people do via Telegram, WhatsApp or others because the app is popular. A secure OS can prevent an exploitation of an app that may work on another OS. GrapheneOS using hardened_malloc, MTE, and other exploit mitigations is a huge help with this because some exploits or exploited apps will crash or not work. We have discovered vulnerabilities in OS components like Bluetooth because of our exploit mitigations crashing when there is bugs on certain Bluetooth devices.&lt;br/&gt;&lt;br/&gt;Assure the person you speak to on the other end is also following good security practices. You are only as secure as the least secure person in a group. Don&amp;#39;t contact people you don&amp;#39;t know that well. Don&amp;#39;t click links or open attachments to people you don&amp;#39;t know or trust enough. You rely on trusting each person you message to be as honest as you are. If you are very high risk, people may choose to just have a separate device for that purpose too. If you&amp;#39;re using something like Telegram or Discord, assume everything you said will be kept and seen by anyone. They are more like public forums than private one-to-one messaging.&lt;br/&gt;&lt;br/&gt;High risk GrapheneOS users or those with physical device access as a risk can specifically look at this:&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsfdvew2fde7lm6tkfqz5m43xxugr998sxe7tfqchfv59uf2yehh3cpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqs8x6ltz&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…6ltz&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; These details should tell you that if you consider these types of groups (sophisticated adversaries with limitless physical access) as a part of your threat model, then you should:&lt;br/&gt;&lt;br/&gt;- Use the most recent phone you possibly can&lt;br/&gt;&lt;br/&gt;- Upgrade your phone to the newest possible generation as soon as possible after release if you can help it.&lt;br/&gt;&lt;br/&gt;- Use the latest version of GrapheneOS ASAP. Do not delay.&lt;br/&gt;&lt;br/&gt;- Use a strong, high entropy passphrase to make bruteforcing the device credential impossible if secure element is ever exploited.&lt;br/&gt;&lt;br/&gt;- Set GrapheneOS auto reboot time accordingly so encrypted data goes back at rest when the phone reboots, which makes AFU exploitation impossible. The lower the better.&lt;br/&gt;&lt;br/&gt;- Enable duress password. Set it to something easy to trigger but not easy to misfire.&lt;br/&gt;&lt;br/&gt;- Turn your phone off in a high risk situation, and trigger duress when in a duress situation.&lt;br/&gt;&lt;br/&gt;- Disable your radios when not using them (turn off Wi-Fi, use airplane mode, disable NFC, UWB etc.) for attack surface reduction.&lt;br/&gt;&lt;br/&gt;- Set an appropriate USB port control or disable the USB port so they aren&#39;t able to connect a device to it.&lt;br/&gt;&lt;br/&gt;- Use user profiles (application data and user files within profiles are stored encrypted with separate credentials).&lt;br/&gt;&lt;br/&gt;- Enable upcoming GrapheneOS security features like second factor authentication unlock when they come out.&lt;br/&gt;&lt;br/&gt;- Communicate only over secure messaging. Some apps like Molly (Signal fork) have features to encrypt the app storage with a passphrase, which access to that app&#39;s data impossible even when a profile is compromised  providing the passphrase is secure enough.&lt;br/&gt;&lt;br/&gt;- Become disassociated to data. Learn to only keep files or other data as long as it is necessary. If you have no use for them for a long time, then back it up elsewhere, encrypted. Delete anything you don&#39;t have a use for in the present. Your data is not your memories. &lt;br/&gt;&lt;br/&gt;- Remember that you are only as secure as the people you trust. If they do not meet your safety or security requirements, don&#39;t enable them to do things that could cause trouble.&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs8uxurjncnpj8uyzqy5gd3lyevzd8u92xhk2xe9fdln5y03hgwrwgpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsgwaf3p&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…af3p&lt;/a&gt;&lt;/span&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-08-25T11:35:20Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsryyk5s96p0pa63xa5pcd6u3qwmzz0cu4329jhw6s7tfudfhedy2qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vcf7fk</id>
    
      <title type="html">Outside of Signal, @nprofile…cway is fantastic if you don&amp;#39;t ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsryyk5s96p0pa63xa5pcd6u3qwmzz0cu4329jhw6s7tfudfhedy2qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vcf7fk" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8kg2mjata6kre40l7dqs479kfak2evls94h9878wkhf2mtq6sewqavx7zm&#39;&gt;nevent1q…x7zm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Outside of Signal, &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nprofile1qqsvnx99ww0sfall7gpv2jtz4ftc9v6wevgdd7g4hh7awkpfvwlezugpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsg5cway&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;simplex&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;nprofile…cway&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; is fantastic if you don&amp;#39;t want a centralised messenger or a phone number requirement.
    </content>
    <updated>2024-08-25T09:32:27Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8kg2mjata6kre40l7dqs479kfak2evls94h9878wkhf2mtq6sewqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc25k3mx3</id>
    
      <title type="html">There is a post on here where I went through that but I can&amp;#39;t ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8kg2mjata6kre40l7dqs479kfak2evls94h9878wkhf2mtq6sewqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc25k3mx3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsv38fzmqzzggtfurxd3tttfw78rrmmaqen0wgq9fdfdx3cf8quvtshwtefd&#39;&gt;nevent1q…tefd&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;There is a post on here where I went through that but I can&amp;#39;t search my own posts on Amethyst.&lt;br/&gt;&lt;br/&gt;Secure messengers depend on the device, if your device is not secure, your messages aren&amp;#39;t either. Getting control of the device is getting control of the messaging app too. And doing the former is far easier and stealthier. &lt;br/&gt;&lt;br/&gt;Messaging apps like Signal getting in on this requires a convoluted plan of the state and the developers to collude. Intelligence ops require the least people to know about it, and preferably no one in the general public. Changing the functionality of the app and server infrastructure to push it to everyone is too loud and risky for a state to perform. Hitting a target with a zero-click exploit to get access to the device and all the data is far easier and is stealthy. Nation states are certain to have exploitation capabilities for tons of computing platforms and apps, but it wouldn&amp;#39;t be collusion since not even these software developers would even know they have it, they are state secrets.&lt;br/&gt;&lt;br/&gt;Tucker (if he is actually telling the truth and isn&amp;#39;t grifting) is a high profile person. He has a gigantic professional network and likely so would this Russian client he communicates with. It would be more realistic that intelligence targeting the Russian client or one of his network got out and revealed his plans. High profile individuals also get hit with spyware campaigns a la Pegasus all the time too. Any one of them can be a target.&lt;br/&gt;&lt;br/&gt;Tucker isn&amp;#39;t a digital security expert, he is a presenter. He isn&amp;#39;t expected to understand what or what did not happen to him. It is possible it&amp;#39;s not even a digital factor, someone in his social circle could have told off too.&lt;br/&gt;&lt;br/&gt;We do have criticisms of Signal and we recommend hardened variations like Molly instead to our users. Signal is mentioned here because Telegram attacked them repeatedly despite performing far worse in security and privacy. We also trust them not to collude. The Signal app itself could have vulnerabilities exploited remotely just like any other messaging app, particularly in the media handling libraries or WebRTC. That&amp;#39;s not a breach of Signal&amp;#39;s encryption or a collusion. A secure hardware and operating system can significantly help to defend apps from remote exploits of vulnerabilities.
    </content>
    <updated>2024-08-25T09:27:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdrspnq5l0q3kjgm8gplyeyrjcdscrwgjj53yz5gmzvjxe9gtmsvczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc255cf97</id>
    
      <title type="html">Telegram has full access to all of the content of group chats and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdrspnq5l0q3kjgm8gplyeyrjcdscrwgjj53yz5gmzvjxe9gtmsvczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc255cf97" />
    <content type="html">
      Telegram has full access to all of the content of group chats and regular one-to-one chats due to lack of end-to-end encryption. Their opt-in secret chats use homegrown end-to-end encryption with weaknesses. Deleting the content from the app likely won&amp;#39;t remove all copies of it.&lt;br/&gt;&lt;br/&gt;Telegram has heavily participated in misinformation campaigns targeting actual private messaging apps with always enabled, properly implemented end-to-end encryption such as Signal. Should stop getting any advice from anyone who told you to use Telegram as a private messenger.&lt;br/&gt;&lt;br/&gt;Telegram is capable of handing over all messages in every group and regular one-to-one chat to authorities in France or any other country. A real private messaging app like Signal isn&amp;#39;t capable of turning over your messages and media. Telegram/Discord aren&amp;#39;t private platforms.&lt;br/&gt;&lt;br/&gt;A major example of how Telegram&amp;#39;s opt-in secret chat encryption has gone seriously wrong before: &lt;a href=&#34;https://words.filippo.io/dispatches/telegram-ecdh/&#34;&gt;https://words.filippo.io/dispatches/telegram-ecdh/&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;The practical near term threat is for the vast majority of chats without end-to-end encryption: 100% of Telegram group chats and the regular 1-to-1 chats.
    </content>
    <updated>2024-08-25T08:27:04Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg4w3tlnuqe6f6jrsdrw5hqxcuvgxd5yl436xcv3xndzs03trl6pqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2dnnh0m</id>
    
      <title type="html">Like the project account said, the Mastodon bridge is done ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg4w3tlnuqe6f6jrsdrw5hqxcuvgxd5yl436xcv3xndzs03trl6pqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2dnnh0m" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0xj69r9uv7xhhkx67gnwcvn96s9vyqkkdz2trnlqddh807un4vnqayhn0e&#39;&gt;nevent1q…hn0e&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Like the project account said, the Mastodon bridge is done automatically, we don&amp;#39;t opt-in to do that nor do we have control of it. &lt;br/&gt;&lt;br/&gt;Also Mastodon bridges are likely to miss posts in larger threads, so I post on them here myself just in case. 
    </content>
    <updated>2024-08-25T08:25:38Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdn4xpma4zu6r84ywhds8dw3dcul7m6hllenckppll69hpsr3dlpgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2nv3340</id>
    
      <title type="html">Happy birthday!</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdn4xpma4zu6r84ywhds8dw3dcul7m6hllenckppll69hpsr3dlpgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2nv3340" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsyrm82v5vg5fjg9fd7pm8kr6hfptuml390pfd55c0xmkjru8c6czqfgdeqz&#39;&gt;nevent1q…deqz&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy birthday!
    </content>
    <updated>2024-08-24T20:55:27Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs00tdpl658w7amdj5twwdvc4cyredt3u8l64pdl5vq7zfsqmcw3cczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2rz0kkx</id>
    
      <title type="html">3a XL is completely end of life and is insecure. We don&amp;#39;t ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs00tdpl658w7amdj5twwdvc4cyredt3u8l64pdl5vq7zfsqmcw3cczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2rz0kkx" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqsm4t0702g93kgetfep4u035gpm267s09kpsa7ykpmdjemzzxx5s4ktr76&#39;&gt;nevent1q…tr76&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;3a XL is completely end of life and is insecure. We don&amp;#39;t keep releases for them anymore after providing harm reduction releases for a while. I&amp;#39;m not sure how Chromecast relates to this, sorry.&lt;br/&gt;
    </content>
    <updated>2024-08-24T20:35:01Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr2p8rvew40e6vavylegapt6ltrdajcenwzlpaevstxzrnyxya3dgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc220cz4j</id>
    
      <title type="html">GrapheneOS is a privacy/security focused mobile OS. You can read ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr2p8rvew40e6vavylegapt6ltrdajcenwzlpaevstxzrnyxya3dgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc220cz4j" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqst9uyerxvz4ndf9pua55l2aqkd8k8f0qk5hmhz9z02d4gzvh8zuvs2nmzlp&#39;&gt;nevent1q…mzlp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;GrapheneOS is a privacy/security focused mobile OS. You can read about it at &lt;a href=&#34;https://grapheneos.org/&#34;&gt;https://grapheneos.org/&lt;/a&gt; 
    </content>
    <updated>2024-08-24T20:29:31Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqpvlvvyds8u8ddcff6wu8d4us664as7fc53362s7nqe2qs8xx7aczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2qfq4gm</id>
    
      <title type="html">The socials at the bottom of the page are for a unified project ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqpvlvvyds8u8ddcff6wu8d4us664as7fc53362s7nqe2qs8xx7aczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2qfq4gm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsp8peckazm6y2vgnnwvws8w4ng5vggrmvf3r3gc46g8ahf9pvmrnc2l2gxv&#39;&gt;nevent1q…2gxv&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The socials at the bottom of the page are for a unified project account or forums. With the way Nostr works sharing nsec between teams isn&amp;#39;t good practice so we have separate.&lt;br/&gt;&lt;br/&gt;Following the project accounts on other platforms are way faster with news, since I cannot always get announcements out on time if I am busy with something else.
    </content>
    <updated>2024-08-24T20:26:35Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfmxa5kzcjt7qm379fqcu2292xjvlrwyeksmq92jsrth9n7m9x7tczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc28s4z2r</id>
    
      <title type="html">We have received donations through OpenSats before. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfmxa5kzcjt7qm379fqcu2292xjvlrwyeksmq92jsrth9n7m9x7tczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc28s4z2r" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvzj48y7fmh7ttfn4w7tzssn756vdpjpjtp8tza7lwlcq3axemtrgs406w7&#39;&gt;nevent1q…06w7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;We have received donations through OpenSats before.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://opensats.org/projects/grapheneos&#34;&gt;https://opensats.org/projects/grapheneos&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Nowadays the page is changed to mostly mostly encourage donations directly to us.
    </content>
    <updated>2024-08-24T20:22:06Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdnt5kjvck2kank0q2j6564gc72gmu3txm9us6tzlau0f2xjqhj6czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2gxylpu</id>
    
      <title type="html">#GrapheneOS support for the Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdnt5kjvck2kank0q2j6564gc72gmu3txm9us6tzlau0f2xjqhj6czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2gxylpu" />
    <content type="html">
      #GrapheneOS support for the Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL is now available via our official site in addition to our staging site.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/install/web&#34;&gt;https://grapheneos.org/install/web&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Most users don&amp;#39;t have any issues. 2 people reported an occasional Wi-Fi connectivity issue not happening for others. These are brand new releases and more will be ironed out.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqstmwmfxl83mzpqpfs0nqqn28f85quanvgzz799vrysklk6dndtulcppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqp8djt5a&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…jt5a&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; The first update for #GrapheneOS on the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL is now available. It now has a full port of our hardware-level &#43; software-level USB-C port control feature as a replacement for our legacy USB peripheral control feature: &lt;a href=&#34;https://grapheneos.org/features#usb-c-port-and-pogo-pins-control&#34;&gt;https://grapheneos.org/features#usb-c-port-and-pogo-pins-control&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;Currently, the only known issue with support for 9th generation Pixels is all volume levels above 0% currently acting the same way. We&#39;re actively working on this and should have a fix for it available soon. Once that&#39;s resolved, we&#39;re already close to a production release.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs0xrueaf43qyvnzgkxgqa69qywpgjh3kvq0qs98kefgvzwhv0kxrqppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqpsl8hyh&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…8hyh&lt;/a&gt;&lt;/span&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-08-24T11:28:37Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstmwmfxl83mzpqpfs0nqqn28f85quanvgzz799vrysklk6dndtulczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc22pgwct</id>
    
      <title type="html">The first update for #GrapheneOS on the Pixel 9, Pixel 9 Pro and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstmwmfxl83mzpqpfs0nqqn28f85quanvgzz799vrysklk6dndtulczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc22pgwct" />
    <content type="html">
      The first update for #GrapheneOS on the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL is now available. It now has a full port of our hardware-level &#43; software-level USB-C port control feature as a replacement for our legacy USB peripheral control feature: &lt;a href=&#34;https://grapheneos.org/features#usb-c-port-and-pogo-pins-control&#34;&gt;https://grapheneos.org/features#usb-c-port-and-pogo-pins-control&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;Currently, the only known issue with support for 9th generation Pixels is all volume levels above 0% currently acting the same way. We&amp;#39;re actively working on this and should have a fix for it available soon. Once that&amp;#39;s resolved, we&amp;#39;re already close to a production release.&lt;br/&gt;&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs0xrueaf43qyvnzgkxgqa69qywpgjh3kvq0qs98kefgvzwhv0kxrqppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqpsl8hyh&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…8hyh&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Experimental releases of #GrapheneOS for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL can already be installed with the web installer on our staging site:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://staging.grapheneos.org/install/web&#34;&gt;https://staging.grapheneos.org/install/web&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Can also use the CLI install guide with the releases listed on the staging site releases page.&lt;br/&gt;&lt;br/&gt;Our USB-C port control feature with both hardware-level and software-level enforcement hasn&#39;t been ported to them yet. They temporarily have our old USB peripherals toggle not depending on changes to device-specific USB HAL and USB-C kernel driver. We aim to get this done soon.&lt;br/&gt;&lt;br/&gt;These are production builds signed with the official keys with our standard update system. They&#39;ll get updated to future releases without needing to reinstall the OS.&lt;br/&gt;&lt;br/&gt;For now, please report issues to our testing chat room rather than our issue tracker: &lt;a href=&#34;https://grapheneos.org/contact#community-chat&#34;&gt;https://grapheneos.org/contact#community-chat&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs9wcn8djm6kttp3r0d97j82s7n4t4ck5jv7y8evk9j4hw9wqs25wcpremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzps26tfjesmn6ksf5mm36hpf9fkjut49sfeutfutvs2phrykn25v9qvzqqqqqqyvuzqgc&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…zqgc&lt;/a&gt;&lt;/span&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-08-23T19:44:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqlt789ehfhfd2cdc7nhzu8eu44m4wh766py4q7dc7wqzy9qu6gpszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fsp0lp</id>
    
      <title type="html">Work will start for it when it is available</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqlt789ehfhfd2cdc7nhzu8eu44m4wh766py4q7dc7wqzy9qu6gpszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fsp0lp" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9acupaz9tv56d3a0frm7rq85nlttarc2mne6vhw3uxtnuvmu9u4csq0chm&#39;&gt;nevent1q…0chm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Work will start for it when it is available
    </content>
    <updated>2024-08-23T13:22:36Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0xrueaf43qyvnzgkxgqa69qywpgjh3kvq0qs98kefgvzwhv0kxrqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2zgym5k</id>
    
      <title type="html">Experimental releases of #GrapheneOS for the Pixel 9, Pixel 9 Pro ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0xrueaf43qyvnzgkxgqa69qywpgjh3kvq0qs98kefgvzwhv0kxrqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2zgym5k" />
    <content type="html">
      Experimental releases of #GrapheneOS for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL can already be installed with the web installer on our staging site:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://staging.grapheneos.org/install/web&#34;&gt;https://staging.grapheneos.org/install/web&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Can also use the CLI install guide with the releases listed on the staging site releases page.&lt;br/&gt;&lt;br/&gt;Our USB-C port control feature with both hardware-level and software-level enforcement hasn&amp;#39;t been ported to them yet. They temporarily have our old USB peripherals toggle not depending on changes to device-specific USB HAL and USB-C kernel driver. We aim to get this done soon.&lt;br/&gt;&lt;br/&gt;These are production builds signed with the official keys with our standard update system. They&amp;#39;ll get updated to future releases without needing to reinstall the OS.&lt;br/&gt;&lt;br/&gt;For now, please report issues to our testing chat room rather than our issue tracker: &lt;a href=&#34;https://grapheneos.org/contact#community-chat&#34;&gt;https://grapheneos.org/contact#community-chat&lt;/a&gt;.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs9wcn8djm6kttp3r0d97j82s7n4t4ck5jv7y8evk9j4hw9wqs25wcpremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzps26tfjesmn6ksf5mm36hpf9fkjut49sfeutfutvs2phrykn25v9qvzqqqqqqyvuzqgc&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…zqgc&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; We&#39;re working on resolving an early boot crash with 9th generation Pixels caused by porting our hardware-level USB-C port control to them. If necessary, we can partially omit this feature for an initial experimental release. Our aim is to have a public experimental release today but not a guarantee. #GrapheneOS&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs2gt0ln2vtm9mtgw3vnm8nccj8hk4c746e0cafh9532357h5ev5ngppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqpckc4n7&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…c4n7&lt;/a&gt;&lt;/span&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-08-23T11:08:47Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9wcn8djm6kttp3r0d97j82s7n4t4ck5jv7y8evk9j4hw9wqs25wczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc24mqdlm</id>
    
      <title type="html">We&amp;#39;re working on resolving an early boot crash with 9th ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9wcn8djm6kttp3r0d97j82s7n4t4ck5jv7y8evk9j4hw9wqs25wczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc24mqdlm" />
    <content type="html">
      We&amp;#39;re working on resolving an early boot crash with 9th generation Pixels caused by porting our hardware-level USB-C port control to them. If necessary, we can partially omit this feature for an initial experimental release. Our aim is to have a public experimental release today but not a guarantee. #GrapheneOS&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs2gt0ln2vtm9mtgw3vnm8nccj8hk4c746e0cafh9532357h5ev5ngppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqpckc4n7&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…c4n7&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Our initial port to the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL is complete and is going to begin going through internal testing. There will likely be at least a few issues to resolve. We&#39;ll likely be able to publish a public experimental release in around 10 to 12 hours. #GrapheneOS&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqstwxd2n9xw7zeaujyr2qxvx5xvtjzzfcdhvehmj3xarwlfqaqe58spzpmhxue69uhkummnw3ezumt0d5hsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqs88cpk2&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…cpk2&lt;/a&gt;&lt;/span&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-08-23T05:11:59Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2gt0ln2vtm9mtgw3vnm8nccj8hk4c746e0cafh9532357h5ev5ngzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2p4egju</id>
    
      <title type="html">Our initial port to the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2gt0ln2vtm9mtgw3vnm8nccj8hk4c746e0cafh9532357h5ev5ngzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2p4egju" />
    <content type="html">
      Our initial port to the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL is complete and is going to begin going through internal testing. There will likely be at least a few issues to resolve. We&amp;#39;ll likely be able to publish a public experimental release in around 10 to 12 hours. #GrapheneOS&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqstwxd2n9xw7zeaujyr2qxvx5xvtjzzfcdhvehmj3xarwlfqaqe58spzpmhxue69uhkummnw3ezumt0d5hsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqs88cpk2&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…cpk2&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; We&#39;ve started work on adding support for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL. We haven&#39;t received our test devices yet but they should arrive within a couple days. Pixel 9 Pro Fold will be supported like the earlier Pixel Fold but it&#39;s launching later than the others.&lt;br/&gt;&lt;br/&gt;#GrapheneOS on the Pixel 9 Pro Fold will be the first folding phone platform with hardware memory tagging support. The original Pixel Fold is a 7th generation device without these security features. We still need a new Pixel Tablet with ARMv9 CPU cores with MTE, PAC and BTI. They&#39;ll hopefully release one in mid-2025 when they release the Pixel 9a.&lt;br/&gt;&lt;br/&gt;Pixel 9 Pro Fold is much better than the first generation Pixel Fold. There have been major advances for the folding screen and it has been widely reviewed as being a much better device. It also has a much broader launch. Likewise, it would be great to have a tablet with MTE and 7 years of support from launch instead of 5. &lt;/blockquote&gt;
    </content>
    <updated>2024-08-22T13:08:31Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfvh674zmvz58s2de93vavgeej7c6mq04tfpr6xq575w3kdgrx9tgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20f2azw</id>
    
      <title type="html">The 8 to 9 don&amp;#39;t have much of a difference in security ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfvh674zmvz58s2de93vavgeej7c6mq04tfpr6xq575w3kdgrx9tgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20f2azw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsplf8njknulqmzvc4cfgmcf7kat9chkxyn8tlcjthtcd94nam8rqclyhx5h&#39;&gt;nevent1q…hx5h&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The 8 to 9 don&amp;#39;t have much of a difference in security compared from 7 to 8. Pixel 8 series is still one of the best choices by far.
    </content>
    <updated>2024-08-21T07:40:19Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstwxd2n9xw7zeaujyr2qxvx5xvtjzzfcdhvehmj3xarwlfqaqe58szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ehshyh</id>
    
      <title type="html">We&amp;#39;ve started work on adding support for the Pixel 9, Pixel 9 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstwxd2n9xw7zeaujyr2qxvx5xvtjzzfcdhvehmj3xarwlfqaqe58szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ehshyh" />
    <content type="html">
      We&amp;#39;ve started work on adding support for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL. We haven&amp;#39;t received our test devices yet but they should arrive within a couple days. Pixel 9 Pro Fold will be supported like the earlier Pixel Fold but it&amp;#39;s launching later than the others.&lt;br/&gt;&lt;br/&gt;#GrapheneOS on the Pixel 9 Pro Fold will be the first folding phone platform with hardware memory tagging support. The original Pixel Fold is a 7th generation device without these security features. We still need a new Pixel Tablet with ARMv9 CPU cores with MTE, PAC and BTI. They&amp;#39;ll hopefully release one in mid-2025 when they release the Pixel 9a.&lt;br/&gt;&lt;br/&gt;Pixel 9 Pro Fold is much better than the first generation Pixel Fold. There have been major advances for the folding screen and it has been widely reviewed as being a much better device. It also has a much broader launch. Likewise, it would be great to have a tablet with MTE and 7 years of support from launch instead of 5.
    </content>
    <updated>2024-08-20T20:01:28Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs85f72kde5cxcm3cxm4ngljq7j43kfqg6s408pumtd6hze0fdqelczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ak63r3</id>
    
      <title type="html">Follow the links provided in this post to check the verified boot ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs85f72kde5cxcm3cxm4ngljq7j43kfqg6s408pumtd6hze0fdqelczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ak63r3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg64h47rrd3hf03dvdwhezulu7z64sgsp4agx03f85cm95j5w5yac6d4fl9&#39;&gt;nevent1q…4fl9&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Follow the links provided in this post to check the verified boot key hash. You can also use remote verification with Auditor to check it is a genuine install. You&amp;#39;re free to remove the device after a single verification if you choose.
    </content>
    <updated>2024-08-17T19:43:26Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8fh3kjcu7m2j777x3m9t2h37mm9rl2hjptug5wr7505gd9axzy9gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2g42dm5</id>
    
      <title type="html">Don&amp;#39;t give into the pressure. Toxicity for this often comes ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8fh3kjcu7m2j777x3m9t2h37mm9rl2hjptug5wr7505gd9axzy9gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2g42dm5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs04k0jeryyhj0j25t90tydzdkhsd5v22n2ugy6wn2mu4zpxufjdjgh550pa&#39;&gt;nevent1q…50pa&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Don&amp;#39;t give into the pressure. Toxicity for this often comes from cognitive dissonance or from a deep discovering sense that they were misled or being too excessive about their approach. Certain security/privacy actions come with spending money and time and people aren&amp;#39;t often willing to accept that their money or time was lost. 
    </content>
    <updated>2024-08-17T18:00:54Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyl3jhdjneee9zqpx5yhzaa4m92vj7783xw5ns4wr0rwf20afwm8czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20463dl</id>
    
      <title type="html">Was meant to reply to this but eventually spun off into it&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyl3jhdjneee9zqpx5yhzaa4m92vj7783xw5ns4wr0rwf20afwm8czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20463dl" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswwmxt6ylrkh030n8ckknta0ftjsprvjuue53lfyv0lxzmckaw25qgwa0zd&#39;&gt;nevent1q…a0zd&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Was meant to reply to this but eventually spun off into it&amp;#39;s own off-topic ramble here:&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsvl6jxl5d3nhgttsp4hx7eyruypt5axqs0pjewryc58m360xc9a3spzpmhxue69uhkummnw3ezumt0d5hsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsusa048&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…a048&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; It&#39;s not a surprise the #security industry is plagued with bad actors, grifters, fraudsters, and even criminals. It&#39;s easy to lie to people to follow bullshit because security and privacy are extremely easy concepts people can understand at a basic level, despite being extremely complex and requiring dedication to understand at a higher level. This is exactly the same way physical and mental health is also used to sell pseudoscience. &lt;br/&gt;&lt;br/&gt;We&#39;re in a space that attracts the fearful and paranoid, and the cold and hard truth is these types of people are easy victims because they always doubt every action they take. Anyone who can&#39;t reflect and accept their own approach will make it hard to develop an approach to stay with. It is easy to tell such people that the way they are doing things are wrong and convince them to do something else. You can reference something obscure and that is enough for some people.&lt;br/&gt;&lt;br/&gt;Pushing security nihilism that trying doesn&#39;t matter isn&#39;t helpful either. It&#39;s harmful. Giving up means you&#39;ll never have an attitude to protect.&lt;br/&gt;&lt;br/&gt;Bad actors in the security community market exactly like scammers, with:&lt;br/&gt;&lt;br/&gt;- A sense of urgency, by saying they are not safe,&lt;br/&gt;- An appeal to authority, referencing famous people,&lt;br/&gt;- Playing on their emotions, like their fear or paranoia,&lt;br/&gt;- Offering of scarcity or exclusivity, that everyone else is missing out or trashing other projects without valid evidence, and&lt;br/&gt;- Referencing current or past events, often with misinformation.&lt;br/&gt;&lt;br/&gt;Why does GrapheneOS or other open source projects go on the offensive then? Because people like these aren&#39;t competitors, they&#39;re threats. In our case, mobile security is extremely plagued with such people, selling dubious feature phones or repackaged old, insecure devices pretending they are endgame security. Some groups make apps or operating systems that don&#39;t add security benefit or reduce security. They&#39;re threats because they endanger people into believing that they are safer when they really are not.&lt;br/&gt;&lt;br/&gt;It wasn&#39;t long ago that the mobile security market had criminals that were selling dubious services bundled onto devices like EncroChat, SkyECC, Phantom Secure and more. They enabled violent criminals and likely also scammed ordinary people in the process with a false sense of security. Hundreds of thousands of people were affected by their takedowns. Companies that used to resell these now try and forget they ever had. &lt;br/&gt;&lt;br/&gt;Certain actors in the security industry also don&#39;t try and innovate security or privacy for the benefit of the world, but to benefit authoritarian regimes and a powerful, abusive elite class willing to pay them for their skills or the power they could leverage. The security industry is meant to be transparent and collaborative, with an unspoken but understood code of ethics to protect and attack to benefit business clients and users. But, some big organisations don&#39;t follow it. Forensic firms like Cellebrite sell exploits to regimes to allow data exfiltration, while mercenaries like NSO selling cyber attacks for customers to commit unlawful espionage against their political opponents and those who dissent.&lt;br/&gt;&lt;br/&gt;Oftentimes the people with money in the bank sell security and privacy to try and whitewash their past actions. For example, Unplugged is founded by Erik Prince, a war criminal and illegal arms dealer of Blackwater fame, who also employ NSO employees that sold spyware to target political opponents, journalists and dissidents. This isn&#39;t the first ex-Defence industry mobile security LARP product and it won&#39;t be the last. It is worse that these companies often steal work from open source developers (like Unplugged stealing from Element and DivestOS&#39; Hypatia) and provide nothing in return.&lt;br/&gt;&lt;br/&gt;I will not be complacent in having such people produce their rot in the space we dedicate our daily life to. We&#39;d rather quit than collaborate with opposition and it wouldn&#39;t have been the first time GrapheneOS had to do this. &lt;/blockquote&gt;
    </content>
    <updated>2024-08-17T17:45:25Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvl6jxl5d3nhgttsp4hx7eyruypt5axqs0pjewryc58m360xc9a3szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vxv457</id>
    
      <title type="html">It&amp;#39;s not a surprise the #security industry is plagued with ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvl6jxl5d3nhgttsp4hx7eyruypt5axqs0pjewryc58m360xc9a3szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vxv457" />
    <content type="html">
      It&amp;#39;s not a surprise the #security industry is plagued with bad actors, grifters, fraudsters, and even criminals. It&amp;#39;s easy to lie to people to follow bullshit because security and privacy are extremely easy concepts people can understand at a basic level, despite being extremely complex and requiring dedication to understand at a higher level. This is exactly the same way physical and mental health is also used to sell pseudoscience. &lt;br/&gt;&lt;br/&gt;We&amp;#39;re in a space that attracts the fearful and paranoid, and the cold and hard truth is these types of people are easy victims because they always doubt every action they take. Anyone who can&amp;#39;t reflect and accept their own approach will make it hard to develop an approach to stay with. It is easy to tell such people that the way they are doing things are wrong and convince them to do something else. You can reference something obscure and that is enough for some people.&lt;br/&gt;&lt;br/&gt;Pushing security nihilism that trying doesn&amp;#39;t matter isn&amp;#39;t helpful either. It&amp;#39;s harmful. Giving up means you&amp;#39;ll never have an attitude to protect.&lt;br/&gt;&lt;br/&gt;Bad actors in the security community market exactly like scammers, with:&lt;br/&gt;&lt;br/&gt;- A sense of urgency, by saying they are not safe,&lt;br/&gt;- An appeal to authority, referencing famous people,&lt;br/&gt;- Playing on their emotions, like their fear or paranoia,&lt;br/&gt;- Offering of scarcity or exclusivity, that everyone else is missing out or trashing other projects without valid evidence, and&lt;br/&gt;- Referencing current or past events, often with misinformation.&lt;br/&gt;&lt;br/&gt;Why does GrapheneOS or other open source projects go on the offensive then? Because people like these aren&amp;#39;t competitors, they&amp;#39;re threats. In our case, mobile security is extremely plagued with such people, selling dubious feature phones or repackaged old, insecure devices pretending they are endgame security. Some groups make apps or operating systems that don&amp;#39;t add security benefit or reduce security. They&amp;#39;re threats because they endanger people into believing that they are safer when they really are not.&lt;br/&gt;&lt;br/&gt;It wasn&amp;#39;t long ago that the mobile security market had criminals that were selling dubious services bundled onto devices like EncroChat, SkyECC, Phantom Secure and more. They enabled violent criminals and likely also scammed ordinary people in the process with a false sense of security. Hundreds of thousands of people were affected by their takedowns. Companies that used to resell these now try and forget they ever had. &lt;br/&gt;&lt;br/&gt;Certain actors in the security industry also don&amp;#39;t try and innovate security or privacy for the benefit of the world, but to benefit authoritarian regimes and a powerful, abusive elite class willing to pay them for their skills or the power they could leverage. The security industry is meant to be transparent and collaborative, with an unspoken but understood code of ethics to protect and attack to benefit business clients and users. But, some big organisations don&amp;#39;t follow it. Forensic firms like Cellebrite sell exploits to regimes to allow data exfiltration, while mercenaries like NSO selling cyber attacks for customers to commit unlawful espionage against their political opponents and those who dissent.&lt;br/&gt;&lt;br/&gt;Oftentimes the people with money in the bank sell security and privacy to try and whitewash their past actions. For example, Unplugged is founded by Erik Prince, a war criminal and illegal arms dealer of Blackwater fame, who also employ NSO employees that sold spyware to target political opponents, journalists and dissidents. This isn&amp;#39;t the first ex-Defence industry mobile security LARP product and it won&amp;#39;t be the last. It is worse that these companies often steal work from open source developers (like Unplugged stealing from Element and DivestOS&amp;#39; Hypatia) and provide nothing in return.&lt;br/&gt;&lt;br/&gt;I will not be complacent in having such people produce their rot in the space we dedicate our daily life to. We&amp;#39;d rather quit than collaborate with opposition and it wouldn&amp;#39;t have been the first time GrapheneOS had to do this.
    </content>
    <updated>2024-08-17T17:44:23Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9g0lnycx2cmau35jwdrpam8ds70fgr6492hmf00n04jwgw2argqszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2p55z26</id>
    
      <title type="html">This is an unused app previously used for demo phones for display ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9g0lnycx2cmau35jwdrpam8ds70fgr6492hmf00n04jwgw2argqszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2p55z26" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs08krmj5pkxtqjpdzgpu4dte73a4xervqnckkxv7wen9dv5kfrmwghetq8c&#39;&gt;nevent1q…tq8c&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;This is an unused app previously used for demo phones for display at phone stores. Android 15 already removed it. GrapheneOS hasn&amp;#39;t bundled apps like this since 2015. You need a physical access and the device&amp;#39;s password, or an extremely sophisticated remote attack with filesystem access to enable it. By that point, you have way more access and control than this app ever did.&lt;br/&gt;&lt;br/&gt;The disclosing party (iVerify) sell a dubious app marketed to protect you against sophisticated remote attacks like Pegasus but cannot do what it claims. They also collaborated with Palantir, a surveillance company trying to sell &amp;#34;predictive policing&amp;#34; tech. It is a scaremongering tactic meant to market their dubious products.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs064ylrdmt8unyk0yymafphtwlpqv39yf392zgn6ffd93da9wt63cppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqpk3crf9&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…crf9&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Wired was manipulated into spreading misinformation to market Palantir and iVerify by misrepresenting a vulnerability in a disabled demo app as being a serious problem which could be exploited in the real world. They should retract the article but won&#39;t.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.wired.com/story/google-android-pixel-showcase-vulnerability/&#34;&gt;https://www.wired.com/story/google-android-pixel-showcase-vulnerability/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;iVerify are scammers and anyone paying them money should rapidly stop doing it and remove their malware from their devices. The real security risk is giving remote code execution on your devices to one of these sketchy EDR companies lying about their capabilities and discoveries.&lt;br/&gt;&lt;br/&gt;This is one of multiple carrier apps in the stock Pixel OS which we don&#39;t include in #GrapheneOS. We were aware of it already since we had to go through them and figure out why they exist. We could embrace this fearmongering and leverage it for marketing, but we aren&#39;t dishonest.&lt;br/&gt;&lt;br/&gt;&#34;iVerify vice president of research [...] points out that while Showcase represents a concerning exposure for Pixel devices, it is turned off by default. This means that an attacker would first need to turn the application on in a target&#39;s device before being able to exploit it.&#34;&lt;br/&gt;&lt;br/&gt;&#34;The most straightforward way to do this would involve having physical access to a victim&#39;s phone as well as their system password or another exploitable vulnerability that would allow them to make changes to settings. Google&#39;s Fernandez emphasized this limiting factor as well.&#34;&lt;br/&gt;&lt;br/&gt;Wired should retract the article and explain how they&#39;re going to do better. They keep publishing this kind of fearmongering misinformation from information security industry charlatans. There are real remote code execution flaws being fixed in Android and iOS but they push this. &lt;/blockquote&gt;
    </content>
    <updated>2024-08-17T11:27:33Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxylqh9rlv0x4t9t08nyafg0lgch8974ht0jnwxjhcg2ap5dparpczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fyl7tm</id>
    
      <title type="html">A company that sells a security theater product that misleads ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxylqh9rlv0x4t9t08nyafg0lgch8974ht0jnwxjhcg2ap5dparpczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fyl7tm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszn5n0fay536ul3h5qtnpl6eprp8xjpsts9yq5epya3nd5xpdp38scrd9ja&#39;&gt;nevent1q…d9ja&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;A company that sells a security theater product  that misleads people about detecting sophisticated remote attacks made a misrepresented claim that an unused, disabled app meant to run on Pixels for display in stores is an exploitable component. Mainstream media went with it without doing prior research.&lt;br/&gt;&lt;br/&gt;Pixels cannot enable this app without physical access with ADB which requires the user&amp;#39;s password, or a sophisticated remote execution exploit that would be more dangerous than the security implications they are trying to imply are.&lt;br/&gt;&lt;br/&gt;GrapheneOS does not bundle this app and we were aware of it for years (2017 or earlier) so it&amp;#39;s irrelevant to GrapheneOS users. It&amp;#39;s scaremongering for marketing for a product that they can&amp;#39;t even possibly do what they claim.
    </content>
    <updated>2024-08-16T20:11:13Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvjzryde5fqgyj7medzs2llcs20kxf739mqqzlstgr4tfljw962cszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc229pv7f</id>
    
      <title type="html">This is a fake story: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvjzryde5fqgyj7medzs2llcs20kxf739mqqzlstgr4tfljw962cszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc229pv7f" />
    <content type="html">
      This is a fake story: &lt;a href=&#34;https://x.com/cryps1s/status/1824077327577591827&#34;&gt;https://x.com/cryps1s/status/1824077327577591827&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Turns out that getting security information from the CISO of a mass surveillance company trying to build a dystopian police state providing police with &amp;#34;predictive policing&amp;#34; software largely based on racial stereotypes is a bad move.&lt;br/&gt;&lt;br/&gt;Trail of Bits iVerify EDR product runs in the standard app sandbox on iOS and Android. It can hardly do anything beyond static scanning of APKs. It&amp;#39;s a crippled antivirus app marketed as detecting sophisticated attackers. It&amp;#39;s a scam and Trail of Bits has lost all credibility. Trail of Bits is working closely with Palantir and is focused on getting government contracts. They&amp;#39;ve created a fake news story to promote their EDR product which has been propagated across mainstream media. Journalists didn&amp;#39;t do basic due diligence and spread false marketing.&lt;br/&gt;&lt;br/&gt;Verizon has a suite of low-level apps for Android devices to fully use their network. These are included on any Android device with full Verizon support. Pixels disable the packages unless a Verizon SIM is active. This is equivalent to having them installed/uninstalled on demand. One of the apps in this suite is the Showcase retail demo app for Verizon to show off phones in their store. It requires manually up the phone as a retail demo device. Verizon says they don&amp;#39;t use it anymore. This demo app is where Trail of Bits / iVerify found an HTTP connection.&lt;br/&gt;&lt;br/&gt;In order to exploit Verizon&amp;#39;s demo app not verifying a signature for the downloaded config or even fetching it via HTTPS, it would already need to be set up to use retail demo mode. The contractors Verizon paid to implement it did a bad job, but it&amp;#39;s not a Pixel security issue. Since it&amp;#39;s an obsolete app that Verizon isn&amp;#39;t using anymore, the stock Pixel OS already removed it in Android 15 which is visible in the Android 15 Beta. The other Verizon apps needed to fully use their network which get activated with a Verizon SIM are of course still included.&lt;br/&gt;&lt;br/&gt;#GrapheneOS has been omitting these carrier apps since around 2015. This meant GrapheneOS users weren&amp;#39;t able to use Sprint and can&amp;#39;t use certain features on Verizon like Wi-Fi calling. Apple has a special deal with Verizon and implements what the control they want as part of iOS. The restrictions set in Verizon&amp;#39;s carrier configuration and the functionality implemented by these apps is a major part of why they prevent installing an alternate OS on any device sold by Verizon. They want to control how people use features like tethering and Wi-Fi calling.&lt;br/&gt;&lt;br/&gt;Every month, a bunch of real vulnerabilities are patched for Android on Pixels. A subset of these including all High and Critical severity issues in Android itself get backported to older Android releases for non-Pixels too. iVerify&amp;#39;s finding isn&amp;#39;t even a Low severity issue. Supposedly reputable news organizations including the Washington Post, New York Times, Wired, etc. are largely acting as press release distribution service for governments and corporations. If it fits a narrative they want to tell, there&amp;#39;s no attempt to question or confirm it.&lt;br/&gt;&lt;br/&gt;Trail of Bits employees should think over whether they want to be part of building a police state with pervasive surveillance as Palantir partners. You&amp;#39;re not even working at a reputable security company anymore. Trail of Bits has become the charlatans they used to criticize.&lt;br/&gt;&lt;br/&gt;#security #privacy
    </content>
    <updated>2024-08-16T19:58:34Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswd759aaga3jlrexdr6vdfenv58nvxx5qp5rpp0qwhd3mk966weqqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2hsuakw</id>
    
      <title type="html">#GrapheneOS has gone through each of the carrier apps included on ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswd759aaga3jlrexdr6vdfenv58nvxx5qp5rpp0qwhd3mk966weqqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2hsuakw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs064ylrdmt8unyk0yymafphtwlpqv39yf392zgn6ffd93da9wt63cl3s0ly&#39;&gt;nevent1q…s0ly&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;#GrapheneOS has gone through each of the carrier apps included on each Pixel generation to determine their purpose and consequences of including or excluding them. Here it is being excluded from the new adevtool project for the late ProtonAOSP and GrapheneOS in 2021:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/GrapheneOS/adevtool/commit/9c5ac945f#diff-95eb7b50f2781158146e721436d7c5d6f7421755906307a6b7a1f727bb20d53eR109&#34;&gt;https://github.com/GrapheneOS/adevtool/commit/9c5ac945f#diff-95eb7b50f2781158146e721436d7c5d6f7421755906307a6b7a1f727bb20d53eR109&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;GrapheneOS has publicly posted about the carrier apps included on Pixels and their privileged permissions on numerous occasions. We talked about the ones which get enabled automatically based on using a SIM from a carrier rather than a disabled demo without an automatic trigger.&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s a thread from 2017 posted from our project&amp;#39;s previous Twitter account which was stolen by Copperhead in 2018:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/CopperheadOS/status/903362108053704704&#34;&gt;https://x.com/CopperheadOS/status/903362108053704704&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Incredibly important to note that this thread directly involves the CEO of Trail of Bits that&amp;#39;s now claiming their iVerify team discovered these apps.&lt;br/&gt;&lt;br/&gt;Stock Pixel OS no longer gives the same level of access to the active carrier. This disabled demo app was never a real part of the problem but it was part of the apps we referring to and excluding. We didn&amp;#39;t claim credit for discovering this when we became aware of it in 2015.&lt;br/&gt;&lt;br/&gt;Dan Guido, CEO of the company behind iVerify, has repeatedly called out charlatans in the infosec industry. It&amp;#39;s incredibly hypocritical to use the same tactics and expect not to be held to the same standard. We&amp;#39;re not doing anything he hasn&amp;#39;t done himself many times before.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s ridiculous to falsely claim something is a backdoor and then get upset your EDR software remotely monitoring devices and opening up new security holes is called malware. An app running within an increasingly strict sandbox trying to defend devices is an unworkable approach.
    </content>
    <updated>2024-08-15T21:24:14Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs064ylrdmt8unyk0yymafphtwlpqv39yf392zgn6ffd93da9wt63czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2dh0gl9</id>
    
      <title type="html">Wired was manipulated into spreading misinformation to market ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs064ylrdmt8unyk0yymafphtwlpqv39yf392zgn6ffd93da9wt63czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2dh0gl9" />
    <content type="html">
      Wired was manipulated into spreading misinformation to market Palantir and iVerify by misrepresenting a vulnerability in a disabled demo app as being a serious problem which could be exploited in the real world. They should retract the article but won&amp;#39;t.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.wired.com/story/google-android-pixel-showcase-vulnerability/&#34;&gt;https://www.wired.com/story/google-android-pixel-showcase-vulnerability/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;iVerify are scammers and anyone paying them money should rapidly stop doing it and remove their malware from their devices. The real security risk is giving remote code execution on your devices to one of these sketchy EDR companies lying about their capabilities and discoveries.&lt;br/&gt;&lt;br/&gt;This is one of multiple carrier apps in the stock Pixel OS which we don&amp;#39;t include in #GrapheneOS. We were aware of it already since we had to go through them and figure out why they exist. We could embrace this fearmongering and leverage it for marketing, but we aren&amp;#39;t dishonest.&lt;br/&gt;&lt;br/&gt;&amp;#34;iVerify vice president of research [...] points out that while Showcase represents a concerning exposure for Pixel devices, it is turned off by default. This means that an attacker would first need to turn the application on in a target&amp;#39;s device before being able to exploit it.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;The most straightforward way to do this would involve having physical access to a victim&amp;#39;s phone as well as their system password or another exploitable vulnerability that would allow them to make changes to settings. Google&amp;#39;s Fernandez emphasized this limiting factor as well.&amp;#34;&lt;br/&gt;&lt;br/&gt;Wired should retract the article and explain how they&amp;#39;re going to do better. They keep publishing this kind of fearmongering misinformation from information security industry charlatans. There are real remote code execution flaws being fixed in Android and iOS but they push this.
    </content>
    <updated>2024-08-15T18:21:04Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqp6ln4guny52gxkq835terp5vefwr7m208dctvcxhpwvx6k6ae2czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc275r3a2</id>
    
      <title type="html">Microsoft&amp;#39;s disclosure article reports they cooperated to ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqp6ln4guny52gxkq835terp5vefwr7m208dctvcxhpwvx6k6ae2czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc275r3a2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsz7sspg9jdjrzu7nlxtmu6lxxswvlvlz77dktdgnka80zyjmw7u7cj586jm&#39;&gt;nevent1q…86jm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Microsoft&amp;#39;s disclosure article reports they cooperated to work a patch in March. It was already patched months ago when the article was was published. &lt;br/&gt;&lt;br/&gt;There&amp;#39;s nothing to suggest this vulnerability was ever exploited in the wild. This is also to do mostly with OpenVPN&amp;#39;s own software which they have across multiple platforms rather than us.
    </content>
    <updated>2024-08-11T17:37:57Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxf8s3xmym2qkqydvvtrlgfsxa57gl77kj8zdlutkwh0unkr0qf3szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20k84kh</id>
    
      <title type="html">Organic Maps (a very nice offline-capable open source maps and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxf8s3xmym2qkqydvvtrlgfsxa57gl77kj8zdlutkwh0unkr0qf3szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc20k84kh" />
    <content type="html">
      Organic Maps (a very nice offline-capable open source maps and navigation app) is now available on Accrescent by the way. I personally use this app myself so I recommend to give it a try.&lt;br/&gt;&lt;br/&gt;If you download it and you previously installed it on Obtainium or an APK then it will appear as a separate app, this is due to Organic Maps using a different application ID for the app released on GitHub. GitHub downloads use &amp;#39;app.organicmaps.web&amp;#39; instead of &amp;#39;app.organicmaps&amp;#39;.&lt;br/&gt;&lt;br/&gt;The Organic Maps team discusses this here: &lt;a href=&#34;https://github.com/organicmaps/organicmaps/issues/8516&#34;&gt;https://github.com/organicmaps/organicmaps/issues/8516&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;As for Accrescent, the maintainers still want to work on developing Accrescent features to allow scaling first rather than adding apps in bulk, but they are allowing apps to come. You are free to read the app requirements and documentation and ask to be added to an allowlist.&lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2024-08-09T03:49:21Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsggl9fry8zu32gs265rpn5aw5h5h2urjyhksndyuuzh596as9jwmczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2kanqd8</id>
    
      <title type="html">Appears not every reply goes through the Mostr bridge but we said ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsggl9fry8zu32gs265rpn5aw5h5h2urjyhksndyuuzh596as9jwmczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2kanqd8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswu4r57jg9e2d8uu47v7fmgj2de40ysz8wk8pccclk0kr4qwe275qallety&#39;&gt;nevent1q…lety&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Appears not every reply goes through the Mostr bridge but we said there was a WiFi reset option if that could help?
    </content>
    <updated>2024-08-09T02:46:05Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst5zrcneemdhre93auccqz487ttd7q3l7309dyqn809f33v32nuhqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2cmkjem</id>
    
      <title type="html">#GrapheneOS version 2024080500 released. This is an early August ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst5zrcneemdhre93auccqz487ttd7q3l7309dyqn809f33v32nuhqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2cmkjem" />
    <content type="html">
      #GrapheneOS version 2024080500 released.&lt;br/&gt;&lt;br/&gt;This is an early August security update release based on the August 2024 security patch backports. This month&amp;#39;s release of the Android Open Source Project and stock Pixel OS should be available later today or tomorrow and we&amp;#39;ll quickly release an update based on it following this one.&lt;br/&gt;&lt;br/&gt;•  full 2024-08-01 security patch level  &lt;br/&gt;&lt;br/&gt;•  suppress crash notifications for 2 harmless crashes occuring on service shutdown for the Android Bluetooth service and Pixel wifi_ext service  &lt;br/&gt;&lt;br/&gt;•  enable memory tagging for the Pixel wifi_ext service again  &lt;br/&gt;&lt;br/&gt;•  Settings: disable predictive back gesture in PIN/password input activities to fix an upstream Android vulnerability  &lt;br/&gt;&lt;br/&gt;•  flash-all: remove unnecessary sleep after flashing AVB key  &lt;br/&gt;&lt;br/&gt;•  flash-all: exit on errors  &lt;br/&gt;&lt;br/&gt;•  flash-all.sh: avoid false negative for device model check  &lt;br/&gt;&lt;br/&gt;•  flash-all.bat: pause before exiting after an error  &lt;br/&gt;&lt;br/&gt;•  fastboot: add support for CLI install with the GrapheneOS optimized factory images format already used by the web installer (will reduce memory/storage usage for CLI installs and will reduce storage usage on the update servers by avoiding multiple factory image formats)  &lt;br/&gt;&lt;br/&gt;•  hardened_malloc: update libdivide to 5.1  &lt;br/&gt;&lt;br/&gt;•  kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.43&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/releases#2024080500&#34;&gt;https://grapheneos.org/releases#2024080500&lt;/a&gt;
    </content>
    <updated>2024-08-06T05:08:20Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvjtdnv6uvyhs0nlqv84025ucnxjvf0yjt0d692mw29aeu6metalczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2sk8qvu</id>
    
      <title type="html">#GrapheneOS version 2024080200 released. This update is an ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvjtdnv6uvyhs0nlqv84025ucnxjvf0yjt0d692mw29aeu6metalczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2sk8qvu" />
    <content type="html">
      #GrapheneOS version 2024080200 released.&lt;br/&gt;&lt;br/&gt;This update is an improvement of the last update&amp;#39;s attempt at fixing potential VPN DNS leaks in certain apps as the last ones broke certain apps like Proton VPN.&lt;br/&gt;&lt;br/&gt;-prevent VPN apps from having leaks to non-VPN DNS servers while not yet strictly preventing leaks to VPN DNS outside the VPN tunnel due to multiple VPN apps including Proton VPN not connecting reliably with stricter enforcement (in a future release, we can do strict blocking by default with an opt-out toggle and a list of known incompatible apps such as Proton VPN until the compatibility issue is resolved)&lt;br/&gt;&lt;br/&gt;- GmsCompatConfig: update to version 126&lt;br/&gt;&lt;br/&gt;- GmsCompatConfig: update to version 127&lt;br/&gt;&lt;br/&gt;- Camera: update to version 73&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/releases#2024080200&#34;&gt;https://grapheneos.org/releases#2024080200&lt;/a&gt;
    </content>
    <updated>2024-08-03T10:27:49Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgjg99mkdd2vusaht3gjh4ergf4wlgzmjc9pjsrl3ehgxllruf8yqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2t5dtsf</id>
    
      <title type="html">This update has been locked to the Alpha channel and won&amp;#39;t be ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgjg99mkdd2vusaht3gjh4ergf4wlgzmjc9pjsrl3ehgxllruf8yqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2t5dtsf" />
    <content type="html">
      This update has been locked to the Alpha channel and won&amp;#39;t be progressed. We&amp;#39;re going to be making another attempt at shipping DNS leak prevention for third party VPN apps. This last attempt resolved a lot of the compatibility issues with the previous approach, so we&amp;#39;ve made some progress. We don&amp;#39;t what&amp;#39;s wrong with Proton VPN and certain other apps for it to break this way.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsxdunwl5zdtjj45ak6jwquk0jgmekeuuf3gsyd6t3cdd2hureweugpremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzps26tfjesmn6ksf5mm36hpf9fkjut49sfeutfutvs2phrykn25v9qvzqqqqqqyl5hd7y&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…hd7y&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; #GrapheneOS version 2024073100 released:&lt;br/&gt;&lt;br/&gt;•  add back our change to prevent app-based VPN implementations from leaking DNS requests when the VPN is down/connecting but without enforcement for VPN apps without DNS configured to avoid breaking compatibility in rare cases (our previous implementation had to be reverted before it reached Stable)&lt;br/&gt;•  kernel (6.6): update to latest GKI LTS branch revision  &lt;br/&gt;•  Camera: update to version 72  &lt;br/&gt;•  Vanadium: update to version 127.0.6533.84.0&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/releases#2024073100&#34;&gt;https://grapheneos.org/releases#2024073100&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#privacy #security &lt;/blockquote&gt;
    </content>
    <updated>2024-08-01T23:04:27Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrkapngpj4wxc3khugr4x6fmvcn7fr288phgjnaysushse9snn68qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc26akg8d</id>
    
      <title type="html">We&amp;#39;ve become aware of another company selling devices with ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrkapngpj4wxc3khugr4x6fmvcn7fr288phgjnaysushse9snn68qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc26akg8d" />
    <content type="html">
      We&amp;#39;ve become aware of another company selling devices with #GrapheneOS while spreading harmful misinformation about it to promote insecure products. We&amp;#39;re making our usual attempt at resolving things privately. However, we need to quickly address what has been claimed regardless.&lt;br/&gt;&lt;br/&gt;Downloading and installing an app followed by entering sensitive data into it or granting it powerful permissions isn&amp;#39;t a vulnerability/exploit. Accessibility service access can&amp;#39;t be directly requested but rather has to be granted via Settings app in the accessibility section.&lt;br/&gt;&lt;br/&gt;Accessibility service access is extremely powerful and essentially gives the same control available to the user to the app. This is explained with clear warnings. It&amp;#39;s also not possible to enable it for an app not installed from a modern app store without an extra hidden menu.&lt;br/&gt;&lt;br/&gt;Apps not installed through a modern app store have extremely dangerous settings including accessibility service access restricted. Users have to navigate to a semi-hidden menu to enable this. UI doesn&amp;#39;t explain how to do it. It&amp;#39;s a higher barrier than simply phishing info, etc.&lt;br/&gt;&lt;br/&gt;Accessibility services are required by many users and the feature can&amp;#39;t simply be removed. It&amp;#39;s possible to disable this and other dangerous features for end users via a device management app. This is the right approach if you have a userbase you want to protect from themselves.&lt;br/&gt;&lt;br/&gt;If you purchase a device with GrapheneOS, we strongly recommend booting it into recovery and wiping data before using it. Next, verify it&amp;#39;s running genuine GrapheneOS:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/install/web#verifying-installation&#34;&gt;https://grapheneos.org/install/web#verifying-installation&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Due to complete verified boot, wiping provides the same assurance as a fresh install.&lt;br/&gt;&lt;br/&gt;Our web installer is very easy to use. If you&amp;#39;re able to use a web browser and follow basic instructions, you have the skill set required to install it:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/install/web&#34;&gt;https://grapheneos.org/install/web&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;However, if you do buy a device with GrapheneOS, you can verify it&amp;#39;s the real deal without malware.&lt;br/&gt;&lt;br/&gt;Simply going to a mainstream local business and purchasing a device to install GrapheneOS is the most secure way to obtain a device.&lt;br/&gt;&lt;br/&gt;Consider the risk of buying a device from a company marketing to cryptocurrency users, and at least follow our wiping and verification advice.&lt;br/&gt;&lt;br/&gt;Purchasing a device with malware installed is something we defend against. We provide a way to block this through verified boot and the verification process recommended on the site. But you can&amp;#39;t prevent something like replacing battery with one including a standalone tracking device...
    </content>
    <updated>2024-08-01T20:34:15Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspmgzk82wjkg05mx0458se2t6zkfva6xrls2cdl0kggsqzfsfx7zgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc29jc7jm</id>
    
      <title type="html">This update is adding a new, improved patch to replace one that ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspmgzk82wjkg05mx0458se2t6zkfva6xrls2cdl0kggsqzfsfx7zgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc29jc7jm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsw6u82xuar94quqsus6qg04nd9jxnzu6x2wylsqst62paqcp4478ghesq7f&#39;&gt;nevent1q…sq7f&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;This update is adding a new, improved patch to replace one that was initially reverted for making some VPN apps like Proton VPN stop working.
    </content>
    <updated>2024-08-01T09:10:11Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxdunwl5zdtjj45ak6jwquk0jgmekeuuf3gsyd6t3cdd2hureweugzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc25jma3h</id>
    
      <title type="html">#GrapheneOS version 2024073100 released: • add back our change ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxdunwl5zdtjj45ak6jwquk0jgmekeuuf3gsyd6t3cdd2hureweugzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc25jma3h" />
    <content type="html">
      #GrapheneOS version 2024073100 released:&lt;br/&gt;&lt;br/&gt;•  add back our change to prevent app-based VPN implementations from leaking DNS requests when the VPN is down/connecting but without enforcement for VPN apps without DNS configured to avoid breaking compatibility in rare cases (our previous implementation had to be reverted before it reached Stable)&lt;br/&gt;•  kernel (6.6): update to latest GKI LTS branch revision  &lt;br/&gt;•  Camera: update to version 72  &lt;br/&gt;•  Vanadium: update to version 127.0.6533.84.0&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/releases#2024073100&#34;&gt;https://grapheneos.org/releases#2024073100&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#privacy #security
    </content>
    <updated>2024-07-31T22:32:13Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxw34zdmqq6njfjcvy76algpmschn2j9mutux03d46xhl0fa43p7qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2hwx443</id>
    
      <title type="html">We&amp;#39;re including a less strict variation of our previous VPN ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxw34zdmqq6njfjcvy76algpmschn2j9mutux03d46xhl0fa43p7qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2hwx443" />
    <content type="html">
      We&amp;#39;re including a less strict variation of our previous VPN DNS leak prevention for third party VPN apps in the next #GrapheneOS release. The new approach only aims to prevent leaks in apps handling DNS configuration correctly. It should avoid causing the compatibility issues which blocked us shipping it before.&lt;br/&gt;&lt;br/&gt;We shipped an even stricter approach in our 2024050900 release but compatibility issues were reporting during Beta testing so it didn&amp;#39;t reach the Stable channel. It was reverted in 2024051500. Proton VPN may now be compatible with it but not all apps will be so we can&amp;#39;t be that strict.&lt;br/&gt;&lt;br/&gt;The hardest part of shipping privacy and security improvements is often fully preserving compatibility with the massive number of Android apps. We try to avoid needing toggles to work around compatibility issues, but we make an exception for apps with memory corruption bugs.
    </content>
    <updated>2024-07-31T16:41:51Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsga0sdmkt4zp0ya2j0wn285l3ecplvkppawrg9gfjpkjg0suvrxxqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2atrdyq</id>
    
      <title type="html">nice</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsga0sdmkt4zp0ya2j0wn285l3ecplvkppawrg9gfjpkjg0suvrxxqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2atrdyq" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstffw58qlzx0a42n3xun77xysnwtkcaeukktxapykavl27nh84hlsfh5r2y&#39;&gt;nevent1q…5r2y&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;nice
    </content>
    <updated>2024-07-31T15:16:45Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspkzzxgrupnjwnx5dd3ceeskau2f0qjqy9g9r97mvrs7lqdtghskszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2mh7kzv</id>
    
      <title>Nostr event nevent1qqspkzzxgrupnjwnx5dd3ceeskau2f0qjqy9g9r97mvrs7lqdtghskszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2mh7kzv</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspkzzxgrupnjwnx5dd3ceeskau2f0qjqy9g9r97mvrs7lqdtghskszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2mh7kzv" />
    <content type="html">
      arstechnica.com/gadgets/2024/07/loss-of-popular-2fa-tool-puts-security-minded-grapheneos-in-a-paradox/&lt;br/&gt;&lt;br/&gt;The article unfortunately leaves out most of the points we made in the thread.&lt;br/&gt;&lt;br/&gt;#GrapheneOS supports hardware-based attestation and it&amp;#39;s entirely possible for Google to allow it as part of the Play Integrity API. They choose to ban using GrapheneOS.&lt;br/&gt;&lt;br/&gt;Play Integrity API has no minimum security patch level and nearly all these apps use weak software-based checks that are easily bypassed by attackers. The hardware-based checks rely on trusting every key distributed to every certified Android device, which are often leaked.&lt;br/&gt;&lt;br/&gt;Hardware-based attestation can be used for security purposes such as verifying device integrity with a pinning-based approach without the weakness of being vulnerable to leaked keys from the whole Android ecosystem since specific per-app keys in the secure element can be pinned.&lt;br/&gt;&lt;br/&gt;Play Integrity API is claimed to be based on devices complying with the Compatibility Test Suite and Compatibility Definition Document. We have irrefutable proof that the majority of certified Android devices do not comply with the CTS/CDD. Play Integrity API is based on lies.&lt;br/&gt;&lt;br/&gt;Essentially every non-Pixel device has important CTS failures not caused by CTS bugs. OEMs are cheating to obtain certification. Google claims GrapheneOS can&amp;#39;t be permitted because we don&amp;#39;t have a certification where they freely allow cheating and don&amp;#39;t ban non-compliant devices.&lt;br/&gt;&lt;br/&gt;Since Play Integrity doesn&amp;#39;t even have a minimum security patch level, it permits a device with multiple years of missing patches. Hardware attestation was required on all devices launched with Android 8 or later, but they don&amp;#39;t enforce it to permit non-compliant devices.&lt;br/&gt;&lt;br/&gt;The reality is that the Play Integrity API permits devices from companies partnered with Google with privileged Google Play integration when they&amp;#39;re running the stock OS. It&amp;#39;s easy to bypass, but they&amp;#39;ll make changes to block it being done at scale long term such as if we did it.&lt;br/&gt;&lt;br/&gt;It does not matter if these devices have years of missing security patches. It doesn&amp;#39;t matter if the companies skipped or improperly implemented mandatory security features despite that being required by CDD compliance. Failing even very important CTS tests doesn&amp;#39;t matter either.&lt;br/&gt;&lt;br/&gt;Google can either permit GrapheneOS in the Play Integrity API in the near future via the approach documented at &lt;a href=&#34;https://grapheneos.org/articles/attestation-compatibility-guide&#34;&gt;https://grapheneos.org/articles/attestation-compatibility-guide&lt;/a&gt; or we&amp;#39;ll be taking legal action against them and their partners. We&amp;#39;ve started the process of talking to regulators and they&amp;#39;re interested.&lt;br/&gt;&lt;br/&gt;We&amp;#39;re not going to give Google veto power over what we&amp;#39;re allowed to do in GrapheneOS. We comply with CTS and CDD except when it limits our ability to provide our users with privacy and security. Google wants to be in charge of which privacy/security features can be added. Nope.&lt;br/&gt;&lt;br/&gt;Google&amp;#39;s behavior in the mobile space is highly anti-competitive. Google should be forbidden from including Google Mobile Services with privileged access unavailable to regular apps and services. GrapheneOS sandboxed Google Play proves that hardly anything even needs to change.&lt;br/&gt;&lt;br/&gt;Google should also be forbidden from participating in blocking using alternate hardware/firmware/software. They&amp;#39;ve abused their market position to reinforce their monopolies. They&amp;#39;ve used security as an excuse despite what they&amp;#39;re doing having no relevance to it and REDUCING it.&lt;br/&gt;&lt;br/&gt;Google is forbidding people from using a growing number of apps and services on an objectively far more private and secure OS that&amp;#39;s holding up much better against multiple commercial exploit developers: &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.social/@GrapheneOS/112826067364945164&#34;&gt;https://grapheneos.social/@GrapheneOS/112826067364945164&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;They&amp;#39;re holding back security, not protecting it.&lt;br/&gt;&lt;br/&gt;We&amp;#39;ve put a lot of effort into collaborating with Google to improve privacy and security for all Android users. Their business team has repeatedly vetoed even considering giving us partner access. They rolled back us being granted security partner access by the security team.&lt;br/&gt;&lt;br/&gt;As with how they handle giving out partner access, the Play Integrity API serves the interests of Google&amp;#39;s business model. They have no valid excuse for not allowing GrapheneOS to pass device and strong integrity. If app developers want to ban it, they can still do it themselves.&lt;br/&gt;&lt;br/&gt;After our security partner access was revoked, we stopped most of our work on improving Android security. We continued reporting vulnerabilities upstream. However, we&amp;#39;re going to stop reporting most vulnerabilities until GrapheneOS is no longer blocked by the Play Integrity API.&lt;br/&gt;&lt;br/&gt;This year, we reported multiple serious vulnerabilities to Android used by widely used commercial exploit tools:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://source.android.com/docs/security/overview/acknowledgements&#34;&gt;https://source.android.com/docs/security/overview/acknowledgements&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;If Google wants more of that in the future, they can use hardware attestation to permit GrapheneOS for their device/strong integrity checks.&lt;br/&gt;&lt;br/&gt;Authy&amp;#39;s response about their usage of the Play Integrity API shows their service is highly insecure and depends on having client side validation. Play Integrity is thoroughly insecure and easily bypassed, so it&amp;#39;s unfortunate that according to Authy their security depends on it.&lt;br/&gt;&lt;br/&gt;If Authy insists on using it, they should use the standard Android hardware attestation API to permit using GrapheneOS too. It&amp;#39;s easy to do:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/articles/attestation-compatibility-guide&#34;&gt;https://grapheneos.org/articles/attestation-compatibility-guide&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Banning 250k&#43; people with the most secure smartphones from using your app is anti-security, not pro-security.&lt;br/&gt;
    </content>
    <updated>2024-07-31T06:12:49Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq9ksjkh5965qq5ep2ja5q7vp8y5cmvqc882wkga8e46540rxvylszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc29tuc89</id>
    
      <title type="html">#GrpaheneOS Camera version 72 released: - use default CameraX ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq9ksjkh5965qq5ep2ja5q7vp8y5cmvqc882wkga8e46540rxvylszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc29tuc89" />
    <content type="html">
      #GrpaheneOS Camera version 72 released:&lt;br/&gt;&lt;br/&gt;- use default CameraX camera selection to avoid compatibility issues with some multi-camera setups&lt;br/&gt;&lt;br/&gt;- avoid video recording not working after audio permission change&lt;br/&gt;&lt;br/&gt;- use CameraX to determine the video timer instead of a separate timer which can get slightly out of sync&lt;br/&gt;&lt;br/&gt;- animate the start of video recording&lt;br/&gt;&lt;br/&gt;- dynamically show/hide EIS settings based on current configuration&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/grapheneos/camera/releases/tag/72&#34;&gt;https://github.com/grapheneos/camera/releases/tag/72&lt;/a&gt;
    </content>
    <updated>2024-07-30T21:44:35Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfd5m2gjzeqfe6p8hgnuj3jluyn0nfguxh0eq3g85s89ynd9q5rsgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc22zddm9</id>
    
      <title type="html">#GrapheneOS version 2024072800 released 2 days ago. • avoid ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfd5m2gjzeqfe6p8hgnuj3jluyn0nfguxh0eq3g85s89ynd9q5rsgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc22zddm9" />
    <content type="html">
      #GrapheneOS version 2024072800 released 2 days ago.&lt;br/&gt;&lt;br/&gt;•  avoid isolating eUICC LPA (eSIM activation) app from third party apps to allow carrier activation apps to work (we still block communication with Google Play to avoid sending telemetry data to Google services when sandboxed Google Play is installed)&lt;br/&gt;&lt;br/&gt;•  Pixel 8a: fix GNSS configuration to avoid occasional crashes of the service (Pixel 8a is currently the only Samsung GNSS device)  &lt;br/&gt;&lt;br/&gt;•  Settings: don&amp;#39;t allow disabling user installed apps when uninstall is disallowed  &lt;br/&gt;&lt;br/&gt;•  Settings: drop code for supporting the legacy Settings UI  &lt;br/&gt;&lt;br/&gt;•  Sandboxed Google Play compatibility layer: avoid infinite wait for GmsCompatConfig update when call to App Store fails  &lt;br/&gt;&lt;br/&gt;•  enforce stack clash protection for x86_64  &lt;br/&gt;&lt;br/&gt;•  enforce minimum 64kiB stack guard size for arm64 due to the standard stack probe size of 64kiB  &lt;br/&gt;&lt;br/&gt;•  future proof our Bionic libc changes for dynamic 64k pages (hardened_malloc still doesn&amp;#39;t support it)  &lt;br/&gt;&lt;br/&gt;•  flash-all: remove unnecessary reboot after flashing Android Verified Boot (AVB) key  &lt;br/&gt;&lt;br/&gt;•  kernel (5.10): update to latest GKI LTS branch revision including update to 5.10.222  &lt;br/&gt;&lt;br/&gt;•  kernel (5.15): update to latest GKI LTS branch revision including update to 5.15.163  &lt;br/&gt;&lt;br/&gt;•  kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.92  &lt;br/&gt;&lt;br/&gt;•  kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.42  &lt;br/&gt;&lt;br/&gt;•  adevtool: update to latest carrier settings  &lt;br/&gt;&lt;br/&gt;•  App Store: update to version 24  &lt;br/&gt;&lt;br/&gt;•  Camera: update to version 69  &lt;br/&gt;&lt;br/&gt;•  Camera: update to version 70  &lt;br/&gt;&lt;br/&gt;•  Camera: update to version 71  &lt;br/&gt;&lt;br/&gt;•  Auditor: update to version 81  &lt;br/&gt;&lt;br/&gt;•  Auditor: update to version 82  &lt;br/&gt;&lt;br/&gt;•  Vanadium: update to version 127.0.6533.64.0  &lt;br/&gt;&lt;br/&gt;•  Vanadium: update to version 127.0.6533.64.1  &lt;br/&gt;&lt;br/&gt;•  GmsCompatConfig: update to version 124  &lt;br/&gt;&lt;br/&gt;•  GmsCompatConfig: update to version 125  &lt;br/&gt;&lt;br/&gt;•  fastboot: add support for generating web installer optimized factory images zip for an improved web install approach not requiring fastbootd  &lt;br/&gt;&lt;br/&gt;•  integrate generating web installation optimized factory images zip into release signing script  &lt;br/&gt;&lt;br/&gt;•  split script/release.sh to remove dependency on build output and the OS source tree (see the new instructions for signing releases)  &lt;br/&gt;&lt;br/&gt;•  rename script/release.sh to script/generate-release.sh  &lt;br/&gt;&lt;br/&gt;•  add script/generate-releases.sh wrapper script&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/releases#2024072800&#34;&gt;https://grapheneos.org/releases#2024072800&lt;/a&gt;
    </content>
    <updated>2024-07-30T19:57:58Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszp49uee5kpfer4emlaw70hf80e2j07ckumu8qxutvzvpn5cw20gqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2sxda9w</id>
    
      <title type="html">We&amp;#39;ve developed a new factory images format optimized for web ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszp49uee5kpfer4emlaw70hf80e2j07ckumu8qxutvzvpn5cw20gqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2sxda9w" />
    <content type="html">
      We&amp;#39;ve developed a new factory images format optimized for web installation which avoids the need for fastbootd mode and greatly reduces memory/storage usage. The new approach is compatible with 5th gen Pixels and later. It&amp;#39;s deployed on our staging site:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://staging.grapheneos.org/install&#34;&gt;https://staging.grapheneos.org/install&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;We&amp;#39;d appreciate help with testing the new web installer on our staging site. It should reduce issues caused by low quality USB connections/drivers by avoiding switching to a different mode. It should also eliminate the need to install a fastboot driver on up-to-date Windows 11.&lt;br/&gt;&lt;br/&gt;We&amp;#39;ll wait for feedback from people using it successfully across different operating systems and devices.&lt;br/&gt;&lt;br/&gt;Sections for working around Debian, Ubuntu and Windows USB deficiencies should be unnecessary other than the legacy extended support devices so we&amp;#39;ll likely remove those.&lt;br/&gt;&lt;br/&gt;#GrapheneOS
    </content>
    <updated>2024-07-30T11:08:05Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgwryzd0h7y2zd74njjr8vuqe7gza4vhe07lpwm9ynr27knnsya2szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2c6guc0</id>
    
      <title type="html">Vanadium version 127.0.6533.64.1 released: - enable per-site ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgwryzd0h7y2zd74njjr8vuqe7gza4vhe07lpwm9ynr27knnsya2szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2c6guc0" />
    <content type="html">
      Vanadium version 127.0.6533.64.1 released:&lt;br/&gt;&lt;br/&gt;- enable per-site isolation for sandboxed iframes instead of per-origin isolation&lt;br/&gt;&lt;br/&gt;- avoid rare uncaught exception from attempting to load content filters from the Vanadium Config app when native code isn&amp;#39;t loaded yet&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/GrapheneOS/Vanadium/releases&#34;&gt;https://github.com/GrapheneOS/Vanadium/releases&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#GrapheneOS
    </content>
    <updated>2024-07-27T09:26:50Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd76g6qvmwpt2zux35jhr789qxgmz5n4t8srjc04n76a5kw9y0spczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc25557q8</id>
    
      <title type="html">GrapheneOS is an AOSP distribution and is compatible with Android ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd76g6qvmwpt2zux35jhr789qxgmz5n4t8srjc04n76a5kw9y0spczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc25557q8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs98lrr8t8tykkdmcc2fk3jm5amvvczqcq906cdlkfz7zc7czgck4g8zytmu&#39;&gt;nevent1q…ytmu&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;GrapheneOS is an AOSP distribution and is compatible with Android apps. Currently the GrapheneOS App Store app mirrors downloads for the Google Play Store or Accrescent so users can download those stores safely if they want them. You&amp;#39;re free to use something else though.
    </content>
    <updated>2024-07-26T15:23:07Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq0vlp02vqwdz6ksy70wn0tygzhyq8vfj323yz65cg03l776xmksszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2yn8anc</id>
    
      <title type="html">The GrapheneOS Foundation monero address is here: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq0vlp02vqwdz6ksy70wn0tygzhyq8vfj323yz65cg03l776xmksszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2yn8anc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0mf6jfk6p2y7z5y7nx6zanf3kjp2wr0ryaru0ukngkfqpazfeeest06frx&#39;&gt;nevent1q…6frx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The GrapheneOS Foundation monero address is here:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://grapheneos.org/donate#monero&#34;&gt;https://grapheneos.org/donate#monero&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;I don&amp;#39;t need my own Monero at this time.&lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2024-07-26T15:18:35Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswxk4lmhn9xkwrqex3rx2zpl26prdqcz6d2zu9gk5u2qvu2gpxg4czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2pla3en</id>
    
      <title type="html">Should specify Bitcoin ratio is higher because of the amount ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswxk4lmhn9xkwrqex3rx2zpl26prdqcz6d2zu9gk5u2qvu2gpxg4czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2pla3en" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrl9mw7s5kxyq793lnt9wmrc7n5fhh9mtep75xw4qcdrltkmjlmpg2dfjcs&#39;&gt;nevent1q…fjcs&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Should specify Bitcoin ratio is higher because of the amount donated, not the amount of Donations themselves. Monero users donate more often, but Bitcoin users donate higher amounts.
    </content>
    <updated>2024-07-26T15:16:12Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrl9mw7s5kxyq793lnt9wmrc7n5fhh9mtep75xw4qcdrltkmjlmpgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2f9rtwa</id>
    
      <title type="html">This time last year, the ratio for BTC:ETH:XMR:ZEC donations via ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrl9mw7s5kxyq793lnt9wmrc7n5fhh9mtep75xw4qcdrltkmjlmpgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2f9rtwa" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9fvsduuz8g7t52cl4sppprmqzj4alhrjpz5gwmjgtl3z2rcugedg3sr6au&#39;&gt;nevent1q…r6au&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;This time last year, the ratio for BTC:ETH:XMR:ZEC donations via donate page addresses are around 40:20:20:1. We received more donations via Monero than Bitcoin and nearly all of the ETH came from a single, gigantic donation enough to hire a full time developer. Outside of Lightning (not official) then Monero is the only consistent, reliable flow of small crypto donations. ETH gets some as well but not as much.
    </content>
    <updated>2024-07-26T10:46:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8x59r5cy8flxnmm35jxpfrluksu700y04jrtll2pnncjnxqwjn9qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2309dvw</id>
    
      <title type="html">#nevent1q…5sc6</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8x59r5cy8flxnmm35jxpfrluksu700y04jrtll2pnncjnxqwjn9qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2309dvw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8txwr2aft24xmzej9zdjhk44d54slw3vq69q73j9k7u9jxurk85sx3x4dq&#39;&gt;nevent1q…x4dq&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs2k54me6va2chd4w9ndh7u0a2r6caf0fksd4ac0rdf68lw85avdycppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqp0s5sc6&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…5sc6&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Chromium has merged the WebAssembly interpreter submitted by a Microsoft Edge engineer:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&#34;&gt;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Once this reaches a Chromium stable release, Vanadium will support WebAssembly by default instead of requiring turning on JS JIT via drop-down site settings. Example of a site using it is Mutiny Wallet.&lt;br/&gt;&lt;br/&gt;Chromium has a V8 Optimizer toggle for disabling the 2 optimized tiers of the Just-In-Time (JIT) compiler to greatly reduce attack surface. However, it doesn&#39;t disable baseline JIT and therefore still does dynamic native code generation. They did this to avoid breaking Wasm.&lt;br/&gt;&lt;br/&gt;In Vanadium, our JIT toggle fully disables the JIT and therefore currently loses Wasm support. An increasing number of sites are depending on Wasm with no fallback to JavaScript. Most of these sites perform perfectly fine with only the fast V8 interpreter and no JIT compilation.&lt;br/&gt;&lt;br/&gt;Vanadium has JIT compilation disabled by default as part of the security focus. This Wasm interpreter will be a nice usability improvement for sites depending on it with no fallback code since users won&#39;t need to toggle on the JIT compiler for the site unless it performs badly. &lt;/blockquote&gt;
    </content>
    <updated>2024-07-26T09:36:11Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspu825sywg6u2hr4sg3ylqx8t857t77wgsgsxrlrcfhrwphk0hshgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc262k8rh</id>
    
      <title type="html">#nevent1q…5sc6</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspu825sywg6u2hr4sg3ylqx8t857t77wgsgsxrlrcfhrwphk0hshgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc262k8rh" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsq6pjxh8jqg0uz6ts5d0ep0jp7ju2jr263y2wl6s73udwx5uypm3qgmur5f&#39;&gt;nevent1q…ur5f&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs2k54me6va2chd4w9ndh7u0a2r6caf0fksd4ac0rdf68lw85avdycppemhxue69uhkummn9ekx7mp0qgsvzkj6vkvxu745zdx7uw4c2f2d5hzafvzw0z60zmyzsdce9564rpgrqsqqqqqp0s5sc6&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…5sc6&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Chromium has merged the WebAssembly interpreter submitted by a Microsoft Edge engineer:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&#34;&gt;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Once this reaches a Chromium stable release, Vanadium will support WebAssembly by default instead of requiring turning on JS JIT via drop-down site settings. Example of a site using it is Mutiny Wallet.&lt;br/&gt;&lt;br/&gt;Chromium has a V8 Optimizer toggle for disabling the 2 optimized tiers of the Just-In-Time (JIT) compiler to greatly reduce attack surface. However, it doesn&#39;t disable baseline JIT and therefore still does dynamic native code generation. They did this to avoid breaking Wasm.&lt;br/&gt;&lt;br/&gt;In Vanadium, our JIT toggle fully disables the JIT and therefore currently loses Wasm support. An increasing number of sites are depending on Wasm with no fallback to JavaScript. Most of these sites perform perfectly fine with only the fast V8 interpreter and no JIT compilation.&lt;br/&gt;&lt;br/&gt;Vanadium has JIT compilation disabled by default as part of the security focus. This Wasm interpreter will be a nice usability improvement for sites depending on it with no fallback code since users won&#39;t need to toggle on the JIT compiler for the site unless it performs badly. &lt;/blockquote&gt;
    </content>
    <updated>2024-07-26T09:36:03Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2k54me6va2chd4w9ndh7u0a2r6caf0fksd4ac0rdf68lw85avdyczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2yezv40</id>
    
      <title type="html">Chromium has merged the WebAssembly interpreter submitted by a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2k54me6va2chd4w9ndh7u0a2r6caf0fksd4ac0rdf68lw85avdyczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2yezv40" />
    <content type="html">
      Chromium has merged the WebAssembly interpreter submitted by a Microsoft Edge engineer:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&#34;&gt;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Once this reaches a Chromium stable release, Vanadium will support WebAssembly by default instead of requiring turning on JS JIT via drop-down site settings. Example of a site using it is Mutiny Wallet.&lt;br/&gt;&lt;br/&gt;Chromium has a V8 Optimizer toggle for disabling the 2 optimized tiers of the Just-In-Time (JIT) compiler to greatly reduce attack surface. However, it doesn&amp;#39;t disable baseline JIT and therefore still does dynamic native code generation. They did this to avoid breaking Wasm.&lt;br/&gt;&lt;br/&gt;In Vanadium, our JIT toggle fully disables the JIT and therefore currently loses Wasm support. An increasing number of sites are depending on Wasm with no fallback to JavaScript. Most of these sites perform perfectly fine with only the fast V8 interpreter and no JIT compilation.&lt;br/&gt;&lt;br/&gt;Vanadium has JIT compilation disabled by default as part of the security focus. This Wasm interpreter will be a nice usability improvement for sites depending on it with no fallback code since users won&amp;#39;t need to toggle on the JIT compiler for the site unless it performs badly.
    </content>
    <updated>2024-07-26T09:34:44Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs20zs3uw0dsxwfp30pp22ckdtpswsnme79skutaqnj2wdvf4x69ugzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2wwmaj5</id>
    
      <title type="html">Yes!!! Yes!!! ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs20zs3uw0dsxwfp30pp22ckdtpswsnme79skutaqnj2wdvf4x69ugzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2wwmaj5" />
    <content type="html">
      Yes!!! Yes!!!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&#34;&gt;https://chromium-review.googlesource.com/c/v8/v8/&#43;/5509903&lt;/a&gt;
    </content>
    <updated>2024-07-25T23:28:51Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv00httdntewrzm3x5hd35sxk8kx9kqxkjewcq2rn0g6h5neafs4qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vu4e7z</id>
    
      <title type="html">For those who can&amp;#39;t read Twitter: Here&amp;#39;s an example of a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv00httdntewrzm3x5hd35sxk8kx9kqxkjewcq2rn0g6h5neafs4qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vu4e7z" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2nkwmsk6sm4zt00ck58z3ukhshsk494me4gzylkn9zlk5n6675wqvl4ym2&#39;&gt;nevent1q…4ym2&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;For those who can&amp;#39;t read Twitter:&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s an example of a &amp;#34;counterterrorism operation&amp;#34; by a U.S.-allied Western government targeting political opponents with NSO exploits:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/&#34;&gt;https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://theguardian.com/world/2022/feb/17/more-polish-opposition-figures-found-to-have-been-targeted-by-pegasus-spyware&#34;&gt;https://theguardian.com/world/2022/feb/17/more-polish-opposition-figures-found-to-have-been-targeted-by-pegasus-spyware&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A more extreme example of a US ally doing a &amp;#34;counterterrorism operation&amp;#34; using NSO exploits:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Assassination_of_Jamal_Khashoggi&#34;&gt;https://en.wikipedia.org/wiki/Assassination_of_Jamal_Khashoggi&lt;/a&gt;
    </content>
    <updated>2024-07-25T20:51:53Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2nkwmsk6sm4zt00ck58z3ukhshsk494me4gzylkn9zlk5n6675wqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2jvmnsl</id>
    
      <title type="html">Unplugged have doubled down on false claims about GrapheneOS ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2nkwmsk6sm4zt00ck58z3ukhshsk494me4gzylkn9zlk5n6675wqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2jvmnsl" />
    <content type="html">
      Unplugged have doubled down on false claims about GrapheneOS security, pretending people cannot buy devices with GrapheneOS installed and pretending it&amp;#39;s hard to install along with promoting their blatantly insecure products with false marketing.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/_AndresSegovia/status/1813261339319804343&#34;&gt;https://x.com/_AndresSegovia/status/1813261339319804343&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;We have an existing thread going through many of their false claims and debunking them:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/GrapheneOS/status/1808161048194671006&#34;&gt;https://x.com/GrapheneOS/status/1808161048194671006&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;We also responded to their lies about GrapheneOS directly. They&amp;#39;ve read our posts and have chosen to continue peddling the same misinformation about GrapheneOS.&lt;br/&gt;&lt;br/&gt;They keep pushing the false claim that Pixels supporting using another OS makes them less secure. The reality is that it&amp;#39;s properly implemented in a secure way without adding any significant attack surface. The bottom of the barrel MediaTek Unplugged devices have awful security.&lt;br/&gt;&lt;br/&gt;They still haven&amp;#39;t ported to the initial release of Android 14 with Android 15 right around the corner. This means they&amp;#39;re missing at least around a year of Moderate severity privacy/security patches and huge privacy/security improvements from the past year of Android releases.&lt;br/&gt;&lt;br/&gt;Unplugged is using an SoC from MediaTek, a company known to have poor security practices, which fares poorly against real attackers and which has a history of repeatedly shipping actual backdoors. They&amp;#39;re trying to portray that as more trustworthy and more secure hardware. Nope.&lt;br/&gt;&lt;br/&gt;Unplugged was founded by Erik Prince, noted war criminal and illegal arms dealer. They make a point in talking about the involvement of their employees in enabling these kinds of operations:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/GrapheneOS/status/1805592120259936338&#34;&gt;https://x.com/GrapheneOS/status/1805592120259936338&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;That doesn&amp;#39;t imply competence, but explains the lack of ethics.&lt;br/&gt;&lt;br/&gt;They&amp;#39;re trying to present themselves as if they were leaders in the field and switched sides, but they never were and simply want money.&lt;br/&gt;&lt;br/&gt;Unplugged is an affinity scam in the same vein as the Freedom Phone. Unplugged has built their product out of open source projects, but without complying with the licenses from projects like DivestOS and while trying to harm open source. Claiming to be in the process of replacing some of the code they were caught stealing doesn&amp;#39;t change much...
    </content>
    <updated>2024-07-25T20:45:43Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfmwwfsw7qs8mlz7qa3whp88qf7mu244xa6dzfpw4jdcmcxas3g7szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2tck9yj</id>
    
      <title type="html">This is mostly why GrapheneOS mods have separate key pairs rather ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfmwwfsw7qs8mlz7qa3whp88qf7mu244xa6dzfpw4jdcmcxas3g7szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2tck9yj" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsz6h9e0a7vyxzefjd2ftplhug28tf6dt2cyrcy705n20m7vndps9cp4jl0e&#39;&gt;nevent1q…jl0e&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;This is mostly why GrapheneOS mods have separate key pairs rather than a project account.
    </content>
    <updated>2024-07-25T11:30:53Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs063sw99psmdyyrms2k040r0s7wpur7mx0vf5qsjlyc988a0p95jgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc236fkul</id>
    
      <title type="html">Agreed. Accrescent is prioritizing on developing to scale ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs063sw99psmdyyrms2k040r0s7wpur7mx0vf5qsjlyc988a0p95jgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc236fkul" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf36reg2vvdkcxm6uayr5da36jpchjrerwjyx7p4fdskw8xcrks9guntc96&#39;&gt;nevent1q…tc96&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Agreed. Accrescent is prioritizing on developing to scale Accrescent in the future and try to provide features the users and app devs want instead of adding apps currently. Eventually the  developer console signups won&amp;#39;t be on a whitelist which will allow for many more apps to get added.
    </content>
    <updated>2024-07-25T05:16:30Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsys29l088gpalevl2f43t36k4smy0up8gk9yaw9zp2dktza6zfl2szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2v6lzhj</id>
    
      <title type="html">Accrescent app store documentation and website have been updated ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsys29l088gpalevl2f43t36k4smy0up8gk9yaw9zp2dktza6zfl2szyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2v6lzhj" />
    <content type="html">
      Accrescent app store documentation and website have been updated to reflect the collaboration with #GrapheneOS.&lt;br/&gt;&lt;br/&gt;If using Accrescent before this, the recommended method to verify Accrescent is to install it from the GrapheneOS App Store. This approach chains the signing verification of Accrescent to GrapheneOS itself, which can then be chained to a hardware-backed root of trust through the GrapheneOS verified boot and Auditor app.&lt;br/&gt;&lt;br/&gt;You can learn more about the Accrescent security modeling here: &lt;a href=&#34;https://accrescent.app/features&#34;&gt;https://accrescent.app/features&lt;/a&gt;
    </content>
    <updated>2024-07-23T03:09:47Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszy84quzcyytta4jdwwkxwdy75hjk3nt0er8js0cugkr0gd5pd57czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2v8mujw</id>
    
      <title type="html">For Signal users: Outside of just the security benefits for using ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszy84quzcyytta4jdwwkxwdy75hjk3nt0er8js0cugkr0gd5pd57czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2v8mujw" />
    <content type="html">
      For Signal users: Outside of just the security benefits for using Molly we discuss a lot about, you should also use it if you don&amp;#39;t use Google Play Services, as the non-FCM push notifications in the original Signal app drains a lot of battery.&lt;br/&gt;&lt;br/&gt;Molly FOSS has a much more efficient implementation of non-FCM push notifications and doesn&amp;#39;t drain battery.&lt;br/&gt;&lt;br/&gt;You can find Molly FOSS on the Accrescent app store (available in GrapheneOS Apps app) or from the project site.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://molly.im/&#34;&gt;https://molly.im/&lt;/a&gt;
    </content>
    <updated>2024-07-22T21:42:08Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdzutr2syczv0sznzj0tk4qguztgc0atchhguh9kp4t4rr73a348czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2sym5du</id>
    
      <title type="html">Transcribro, AppVerifier and BeauTyXT is by the same developer ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdzutr2syczv0sznzj0tk4qguztgc0atchhguh9kp4t4rr73a348czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2sym5du" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0mcl0zlr6wym3f4w47npvu875r7dzyfnucpv5ylccrhaxa7m9yfgezshp4&#39;&gt;nevent1q…shp4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Transcribro, AppVerifier and BeauTyXT is by the same developer who worked on our Info app. Anyone looking for a voice input, app signature verifier or text / notes editor are free to use any of those.
    </content>
    <updated>2024-07-22T13:41:14Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgpn6vj3re7qngn9tn3a7w58h63wzralkz3n59mfm0rd82wtfznxqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc290w522</id>
    
      <title type="html">These tools/procedures are widely used for other reasons ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgpn6vj3re7qngn9tn3a7w58h63wzralkz3n59mfm0rd82wtfznxqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc290w522" />
    <content type="html">
      These tools/procedures are widely used for other reasons including at border crossings. They get training to use it. Law enforcement also often uses them illegally for unjustified search and seizure targeting those who have done nothing beyond crossing a border or journalism. The groups of people using tools from Cellebrite or competitors are often the ones breaking the law or using them for criminal reasons. Many of the people using these tools are criminals breaking the laws of the land.&lt;br/&gt;&lt;br/&gt;Even if they say it&amp;#39;s only for certain governments and law enforcement clients, it doesn&amp;#39;t and won&amp;#39;t stop them getting out. There are likely militias, juntas, or criminals in the world with access to these tools as long as they are powerful enough. If Cellebrite isn&amp;#39;t available somewhere, something else will take it&amp;#39;s place. If we can get documentation, someone far more powerful could get far more.&lt;br/&gt;&lt;br/&gt;Defending against tools like these being only valuable to the criminals is a narrative for authoritarianism. Don&amp;#39;t let them attack you this way.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs0nywe3nndmy58zfuezntqpqujr6luz5e6cxg26yfvy9e678ea2kcpzpmhxue69uhkummnw3ezumt0d5hsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsn0aw2x&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…aw2x&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; EXCLUSIVE: Here&#39;s the Cellebrite Premium 7.69.5 iOS Support Matrix from July 2024.&lt;br/&gt;&lt;br/&gt;404media recently published an article based on the same April 2024 docs we received in April and published in May. Many tech news sites including 9to5Mac made incorrect assumptions treating that as current.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/f042276d5b54561f39a1cf73f9e3dc5c0b8946c4744eb7a20445c859fcbdc7c3.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/df75e212117bed9ec8e1ae80c06ac78ab66dd981931a5f2c796803150856fbf9.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/24e57317d9f77fc17bb26485a319e28d02c0f36df2038681acae9d0ebc1c1bcb.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt;Here&#39;s the Cellebrite Premium 7.69.5 Android Support Matrix from July 2024 for Pixels. They&#39;re still unable to exploit locked #GrapheneOS devices unless they&#39;re missing patches from 2022. A locked GrapheneOS device also automatically gets back to BFU from AFU after 18h by default.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/6c2c963377aa75af248e5c4ce646df70f50e1d5eedb2184e4b27f63faffd44ee.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/33551de196f545a14b82051aa2a4a826fb84577821c60f4b9841508fb73af375.jpg&#34;&gt;  &lt;/blockquote&gt;
    </content>
    <updated>2024-07-22T09:51:13Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8uz4f2quv4v72d8skeq566zwwfjcwn2027xj282jtuu386y6lrhczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2j48pxm</id>
    
      <title type="html">Regardless, when using an app store you are required to trust the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8uz4f2quv4v72d8skeq566zwwfjcwn2027xj282jtuu386y6lrhczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2j48pxm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqrsjxtprynppwd6kaqk0x4dyd0jc0ajfkvtv76f92j9vm4f9e34g7sqg0r&#39;&gt;nevent1q…qg0r&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Regardless, when using an app store you are required to trust the app itself, the party who maintains the app, and the source of the apps. If your source to get the apps is from the same party who develops the app store, there is less parties to trust. It&amp;#39;s a big reason we provide the option to install the apps like Markup, Android Auto, or Play Services directly from GrapheneOS as well. You&amp;#39;d only need to trust the apps and the developers rather than an arbitrary additional party just to get those apps specifically.
    </content>
    <updated>2024-07-21T23:26:56Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs07nzsdd8t4n6strarfz52rdp6lrwqx0tyznp3r6zn8ncqwndnyyszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2myuc5v</id>
    
      <title type="html">I explained a bit about how the security modeling of Accrescent ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs07nzsdd8t4n6strarfz52rdp6lrwqx0tyznp3r6zn8ncqwndnyyszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2myuc5v" />
    <content type="html">
      I explained a bit about how the security modeling of Accrescent (new third party app store available in our Apps app) works here, if anyone is interested.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqsppzrz5247av55sc7jy4etu8vk890z0pp0dm7rcn3uaqyw2v83t8gpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqs85v6vl&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…v6vl&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; Nostr or the like wont be involved for Accrescent, it&#39;s been designed to compliment GrapheneOS to be a private and secure app store in the same fashion that GrapheneOS is. There had been interests for us using Accrescent for a long time and this addition coming in a time where people are into using other app stores is just a coincidence. Accrescent has been in active development and maintenance since 2021 and we had expressed interest to mirror it in our Apps app for a while.&lt;br/&gt;&lt;br/&gt;&gt; Accrescent&#39;s catalog is maintained by a respected community member and checks dev signatures on a third-party database on Github. Correct me if I&#39;m wrong. &lt;br/&gt;&lt;br/&gt;This is not done through GitHub rather Accrescent&#39;s own hosted infrastructure. When you open the app it will download the current repository metadata JSON which has the app names, ID, signing cert hashes, etc.&lt;br/&gt;&lt;br/&gt;&gt; Users will be able to cryptographically verify an artifact came from a developer using nostr. They can do so directly, relying on a web-of-trust check, or indirectly via curators (choose your own walled gardens).&lt;br/&gt;&lt;br/&gt;For Accrescent, apps are verified by key pinning of the apps and signing of the app store&#39;s repository data. The repository is signed by Accrescent and verified with the repository data public key (hard coded into the app) before it can be fetched. It has downgrade protection and also has a minimum revision hard coded to protect against being served old metadata on first use. It also can support key rotation.&lt;br/&gt;&lt;br/&gt;Downloading an app will make the client check the signed repository metadata and compare the app&#39;s certificate hash, minimum version, and app name from the signed repository metadata. If any of the parameters do not match it will not install the app for you. For updates it does not matter as Android won&#39;t let you update apps with a different certificate than your currently installed version.&lt;br/&gt;&lt;br/&gt;Minimum version protects against first install of an insecure, older version, and app name protects against malicious copycat apps.&lt;br/&gt;&lt;br/&gt;When someone submits an app on the Accrescent developer console (whitelist only right now) for the first time, it will put a hash of their app&#39;s signing key to the repository metadata. This makes sure users are only downloading apps by the real developer. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;/blockquote&gt;
    </content>
    <updated>2024-07-21T21:56:03Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsppzrz5247av55sc7jy4etu8vk890z0pp0dm7rcn3uaqyw2v83t8gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2aauhvg</id>
    
      <title type="html">Nostr or the like wont be involved for Accrescent, it&amp;#39;s been ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsppzrz5247av55sc7jy4etu8vk890z0pp0dm7rcn3uaqyw2v83t8gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2aauhvg" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqst8tm7fj4fd4zu7d938ltcqqu7e0h2z0kpsxggfgzjapph5tmhjkcrv49gs&#39;&gt;nevent1q…49gs&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Nostr or the like wont be involved for Accrescent, it&amp;#39;s been designed to compliment GrapheneOS to be a private and secure app store in the same fashion that GrapheneOS is. There had been interests for us using Accrescent for a long time and this addition coming in a time where people are into using other app stores is just a coincidence. Accrescent has been in active development and maintenance since 2021 and we had expressed interest to mirror it in our Apps app for a while.&lt;br/&gt;&lt;br/&gt;&amp;gt; Accrescent&amp;#39;s catalog is maintained by a respected community member and checks dev signatures on a third-party database on Github. Correct me if I&amp;#39;m wrong. &lt;br/&gt;&lt;br/&gt;This is not done through GitHub rather Accrescent&amp;#39;s own hosted infrastructure. When you open the app it will download the current repository metadata JSON which has the app names, ID, signing cert hashes, etc.&lt;br/&gt;&lt;br/&gt;&amp;gt; Users will be able to cryptographically verify an artifact came from a developer using nostr. They can do so directly, relying on a web-of-trust check, or indirectly via curators (choose your own walled gardens).&lt;br/&gt;&lt;br/&gt;For Accrescent, apps are verified by key pinning of the apps and signing of the app store&amp;#39;s repository data. The repository is signed by Accrescent and verified with the repository data public key (hard coded into the app) before it can be fetched. It has downgrade protection and also has a minimum revision hard coded to protect against being served old metadata on first use. It also can support key rotation.&lt;br/&gt;&lt;br/&gt;Downloading an app will make the client check the signed repository metadata and compare the app&amp;#39;s certificate hash, minimum version, and app name from the signed repository metadata. If any of the parameters do not match it will not install the app for you. For updates it does not matter as Android won&amp;#39;t let you update apps with a different certificate than your currently installed version.&lt;br/&gt;&lt;br/&gt;Minimum version protects against first install of an insecure, older version, and app name protects against malicious copycat apps.&lt;br/&gt;&lt;br/&gt;When someone submits an app on the Accrescent developer console (whitelist only right now) for the first time, it will put a hash of their app&amp;#39;s signing key to the repository metadata. This makes sure users are only downloading apps by the real developer. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2024-07-21T21:47:21Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxqgz7wrmmdccr98gpmpvlxx38l266mpch3pg5zzyndgpzh3ddnvszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2tdxx6g</id>
    
      <title type="html">In January 2024, we reported several vulnerabilities being ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxqgz7wrmmdccr98gpmpvlxx38l266mpch3pg5zzyndgpzh3ddnvszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2tdxx6g" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg3cudrhk0j63rpwe9vq6q7nyzphcz6nhz6a6nnclmt9j3qdn493gqz6ge0&#39;&gt;nevent1q…6ge0&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;In January 2024, we reported several vulnerabilities being exploited by the XRY tool from MSAB to get data from Android devices including stock OS Pixels. In April 2024, Pixels shipped a reset attack mitigation we proposed preventing the whole attack vector. We plan to expand it.&lt;br/&gt;&lt;br/&gt;Currently, non-Pixel devices are still vulnerable to these reset attacks. In June 2024, Android 14 QPR3 included another feature we proposed providing wipe-without-reboot support for the device admin wipe API. We shipped this early and use it in our duress PIN/password feature.&lt;br/&gt;&lt;br/&gt;We also began triggering a full compacting garbage collection cycle in system_server and SystemUI when the device is locked based on info about these attacks. This releases memory for no longer allocated objects to the OS, where our generic zero-on-free feature clears all of it.&lt;br/&gt;&lt;br/&gt;In the near future, we plan to ship support for adding a PIN as a 2nd factor to fingerprint unlock to enable users to use a strong passphrase combined with PIN&#43;fingerprint secondary unlock for convenience. We have an initial implementation, but it needs more work before shipping.
    </content>
    <updated>2024-07-21T20:14:50Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg3cudrhk0j63rpwe9vq6q7nyzphcz6nhz6a6nnclmt9j3qdn493gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ga8925</id>
    
      <title type="html">Here&amp;#39;s the Cellebrite Premium 7.69.5 Android Support Matrix ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg3cudrhk0j63rpwe9vq6q7nyzphcz6nhz6a6nnclmt9j3qdn493gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ga8925" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0nywe3nndmy58zfuezntqpqujr6luz5e6cxg26yfvy9e678ea2kce2v5tp&#39;&gt;nevent1q…v5tp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s the Cellebrite Premium 7.69.5 Android Support Matrix from July 2024 for overall Android devices. Other than the Titan M2 on the Pixel 6 and later not being successful to bypass brute force protection, it&amp;#39;s largely just based on what they&amp;#39;ve had time to support.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/722344fe8572d1f1b0f0f1a706d79d28727798684ccca26735c9649e2dc89f6a.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/f57098508137691a04584d96325786a9b131890ad8eba7d4770e8771063f6b1d.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/fc4dab33a45ed92b751f28093959a0a0e2f3b2c636e69900b36ad0555d43a0d9.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/dc2f3d85bb4a10ccfb6d17b6400f3658df4dbfe70db1fb539b0da3965741fee1.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt;#GrapheneOS
    </content>
    <updated>2024-07-21T19:45:14Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0nywe3nndmy58zfuezntqpqujr6luz5e6cxg26yfvy9e678ea2kczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2n60gdg</id>
    
      <title type="html">EXCLUSIVE: Here&amp;#39;s the Cellebrite Premium 7.69.5 iOS Support ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0nywe3nndmy58zfuezntqpqujr6luz5e6cxg26yfvy9e678ea2kczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2n60gdg" />
    <content type="html">
      EXCLUSIVE: Here&amp;#39;s the Cellebrite Premium 7.69.5 iOS Support Matrix from July 2024.&lt;br/&gt;&lt;br/&gt;404media recently published an article based on the same April 2024 docs we received in April and published in May. Many tech news sites including 9to5Mac made incorrect assumptions treating that as current.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/f042276d5b54561f39a1cf73f9e3dc5c0b8946c4744eb7a20445c859fcbdc7c3.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/df75e212117bed9ec8e1ae80c06ac78ab66dd981931a5f2c796803150856fbf9.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/24e57317d9f77fc17bb26485a319e28d02c0f36df2038681acae9d0ebc1c1bcb.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt;Here&amp;#39;s the Cellebrite Premium 7.69.5 Android Support Matrix from July 2024 for Pixels. They&amp;#39;re still unable to exploit locked #GrapheneOS devices unless they&amp;#39;re missing patches from 2022. A locked GrapheneOS device also automatically gets back to BFU from AFU after 18h by default.&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/6c2c963377aa75af248e5c4ce646df70f50e1d5eedb2184e4b27f63faffd44ee.jpg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://image.nostr.build/33551de196f545a14b82051aa2a4a826fb84577821c60f4b9841508fb73af375.jpg&#34;&gt; 
    </content>
    <updated>2024-07-21T19:26:24Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyws4pljcr0mlxmlxqmqzp9dtslwehnukd4zfqsqe2fmvtfj4ht9gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc23q0vhn</id>
    
      <title type="html">If you are using a 6 digit or higher PIN then you rely on the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyws4pljcr0mlxmlxqmqzp9dtslwehnukd4zfqsqe2fmvtfj4ht9gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc23q0vhn" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvua95lk20lf9q8a7kexu0e9yegqymerjnavgzxvyy202lu50dnfqszjez5&#39;&gt;nevent1q…jez5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If you are using a 6 digit or higher PIN then you rely on the secure element to protect you from brute force attacks. If such a component is exploited then it could be possible to brute force quickly/without a throttle. Using a strong passphrase (Diceware 7 random words, or random case letters, symbols and digits for 18 characters or better) makes this impossible.
    </content>
    <updated>2024-07-21T12:54:52Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs27zdqfmehwlmutx72ww90d0tq2uuj0l5pqxszlnlvrdqjt2twtkqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2xndk0y</id>
    
      <title type="html">Issue: https://github.com/GrapheneOS/os-issue-tracker/issues/28 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs27zdqfmehwlmutx72ww90d0tq2uuj0l5pqxszlnlvrdqjt2twtkqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2xndk0y" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszynn5gfhahsaytqlvjumdvqtrljvr3mv0p0lwcyc63sxar9rrsrgq4msjg&#39;&gt;nevent1q…msjg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Issue: &lt;a href=&#34;https://github.com/GrapheneOS/os-issue-tracker/issues/28&#34;&gt;https://github.com/GrapheneOS/os-issue-tracker/issues/28&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Current fork branch: &lt;a href=&#34;https://github.com/u-fred/platform_frameworks_base/commits/issue28/&#34;&gt;https://github.com/u-fred/platform_frameworks_base/commits/issue28/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;I&amp;#39;m not the contributor. Where to find could be subject to change.
    </content>
    <updated>2024-07-21T09:29:53Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9fj47zh6pd5n43x5jknk80ku9na2ur4whx2yta5ad4qye4c883jczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fa6kzn</id>
    
      <title type="html">UPDATE: Someone has shared a newer version of the iOS table ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9fj47zh6pd5n43x5jknk80ku9na2ur4whx2yta5ad4qye4c883jczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2fa6kzn" />
    <content type="html">
      UPDATE: Someone has shared a newer version of the iOS table indicating Cellebrite caught up to iOS 17.5.1 or higher along with the iPhone 15 for the OS exploits.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s common for them to fall behind by a few months for new iOS and Android versions. Android and iOS have no secure way to automatically get devices back into Before First Unlock from After First Unlock as GrapheneOS does so attackers can simply wait until they have an exploit.&lt;br/&gt;&lt;br/&gt;We&amp;#39;re currently waiting for one of our several sources to provide us with the new Android and iOS documentation. We aren&amp;#39;t going to post the leaked iOS table in this thread because we can&amp;#39;t confirm that it&amp;#39;s authentic yet. We should have the new documentation quite soon though.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s unfortunate that there was a whole bunch of secondary news coverage where it was misreported that Cellebrite was unable to exploit current iOS based on documentation from April 2024. It&amp;#39;s July 2024 now, and they&amp;#39;ve had months to restore the capabilities broken by an update.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs8uxurjncnpj8uyzqy5gd3lyevzd8u92xhk2xe9fdln5y03hgwrwgpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsgwaf3p&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…af3p&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; We published the Cellebrite Premium documentation from April 2024 in May 2024.&lt;br/&gt;&lt;br/&gt;Our thread properly explained the info in the tables including their inability to exploit Pixel 6 or later secure element and only partially bypass it on iPhone 12 or later at that current period of time.&lt;br/&gt;&lt;br/&gt;Cellebrite was a few months behind on supporting the latest iOS versions. It&#39;s common for them to fall a few months behind for the latest iOS and quarterly/yearly Android releases. They&#39;ve had April, May, June and July to advance further. It&#39;s wrong to assume capabilities didn&#39;t change for the later iPhones.&lt;br/&gt;&lt;br/&gt;404media published an article about the leaked documentation this week but it doesn&#39;t go into depth analyzing the leaked information as we did, but it didn&#39;t make any major errors. Many news publications are now writing highly inaccurate articles about it following that coverage.&lt;br/&gt;&lt;br/&gt;The detailed Android table showing the same info as iPhones for Pixels wasn&#39;t included in the article. Other news publications appear to be ignoring the leaked docs and our thread linked by 404media with more detail. They&#39;re only paraphrasing that article and making assumptions.&lt;br/&gt;&lt;br/&gt;The person who shared it with 404media is one of our community members. We regularly get sent this kind of information. In the case of XRY from MSAB, we were able to report several Android vulnerabilities based on their docs which are now fixed on Pixels but not elsewhere yet.&lt;br/&gt;&lt;br/&gt;We received Cellebrite&#39;s April 2024 Android and iOS support documents in April and from another source in May before publishing it. Someone else shared those and more documents on our forum. It didn&#39;t help us improve GrapheneOS, but it&#39;s good to know what we&#39;re doing is currently working.&lt;br/&gt;&lt;br/&gt;It would be a lot more helpful if people leaked the current code for Cellebrite, Graykey and XRY to us. We&#39;ll report all of the Android vulnerabilities they use whether or not they can be used against GrapheneOS. We can also make suggestions on how to fix vulnerability classes.&lt;br/&gt;&lt;br/&gt;In April, Pixels added a reset attack mitigation feature based on our proposal ruling out the class of vulnerability being used by XRY.&lt;br/&gt;&lt;br/&gt;In June, Pixels added support for wipe-without-reboot based on our proposal to prevent device admin app wiping bypass being used by XRY.&lt;br/&gt;&lt;br/&gt;In Cellebrite&#39;s docs, they show they can extract the iOS lock method from memory on an After First Unlock device after exploiting it, so the opt-in data classes for keeping data at rest when locked don&#39;t really work. XRY used a similar issue in their now blocked Android exploit.&lt;br/&gt;&lt;br/&gt;#GrapheneOS zero-on-free features appear to stop that data from being kept around after unlock. However, it would be nice to know what&#39;s being kept around. It&#39;s not the password since they have to brute force so it must be the initial scrypt-derived key or one of the hashes of it. &lt;/blockquote&gt;
    </content>
    <updated>2024-07-21T00:49:49Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2zx4myqurw3tv9h8u6vz2x33svt5j5v5kwzcv6t27jgzzczg0hkszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2gas8p6</id>
    
      <title type="html">Yes, but it can also verify currently installed apps too. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2zx4myqurw3tv9h8u6vz2x33svt5j5v5kwzcv6t27jgzzczg0hkszyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2gas8p6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsw84zszm8ckc4j373prlrht9fvf6f2ugrc6g46j9s8g8qh7exsefq6mjnkt&#39;&gt;nevent1q…jnkt&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yes, but it can also verify currently installed apps too.&lt;br/&gt;&lt;br/&gt;Installing an app from an APK file is trust on first use. All apps are signed by a certificate from the app developer which the OS trusts. Apps can only update if it is both a newer version, and it is signed by the same certificate it came with.&lt;br/&gt; &lt;br/&gt;Updates are verified by only allowing updates from that same developer&amp;#39;s certificate. If it doesn&amp;#39;t match, it will fail. This prevents installing a fake or malicious update.&lt;br/&gt;&lt;br/&gt;AppVerifier checks the apps you installed are have the genuine certificate and package name from the developer. It can compare to keys you provide or it can check from an internal database of apps in the app if there is an entry for it.&lt;br/&gt;&lt;br/&gt;DB can be found here: &lt;a href=&#34;https://github.com/soupslurpr/AppVerifier/blob/master/app/src/main/kotlin/dev/soupslurpr/appverifier/InternalVerificationInfoDatabase.kt&#34;&gt;https://github.com/soupslurpr/AppVerifier/blob/master/app/src/main/kotlin/dev/soupslurpr/appverifier/InternalVerificationInfoDatabase.kt&lt;/a&gt;
    </content>
    <updated>2024-07-21T00:23:04Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9tplnd0gt23npwz63ng0cezxtax53xmsd7xrzpx9rndchjvpd9yczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc28ruryd</id>
    
      <title type="html">AppVerifier was based on a planned GrapheneOS feature for users ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9tplnd0gt23npwz63ng0cezxtax53xmsd7xrzpx9rndchjvpd9yczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc28ruryd" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspr3rvvy0hjyxmepcm5d340e34tmdarwhhwuxz7gymrd8ugh76yjcvg0dve&#39;&gt;nevent1q…0dve&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;AppVerifier was based on a planned GrapheneOS feature for users to verify APK files based on their key fingerprint. The feature is currently stalled since relying on the clipboard isn&amp;#39;t ideal. For now, users can use AppVerifier from Accrescent until we ship a built-in approach to this.
    </content>
    <updated>2024-07-20T23:46:58Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspr3rvvy0hjyxmepcm5d340e34tmdarwhhwuxz7gymrd8ugh76yjczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ap507f</id>
    
      <title type="html">The lead dev of Accrescent is a GrapheneOS user and contributor. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspr3rvvy0hjyxmepcm5d340e34tmdarwhhwuxz7gymrd8ugh76yjczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ap507f" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswje569x9x4tew54tnprlt589mut2mgjlmt9p6w2mq3wvykm78gcc4r5agf&#39;&gt;nevent1q…5agf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The lead dev of Accrescent is a GrapheneOS user and contributor. It&amp;#39;ll be a good place to publish apps especially for GrapheneOS users. AppVerifier, BeauTyXT (text editor) and Transcribro (private, on device voice recognition and keyboard) are from the same person who wrote our GrapheneOS Info app. Molly is a security-focused fork of Signal from another GrapheneOS user.
    </content>
    <updated>2024-07-20T23:44:39Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswje569x9x4tew54tnprlt589mut2mgjlmt9p6w2mq3wvykm78gcczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2r8fz2l</id>
    
      <title type="html">Accrescent comes from within the GrapheneOS community and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswje569x9x4tew54tnprlt589mut2mgjlmt9p6w2mq3wvykm78gcczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2r8fz2l" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsyecd47jmn47kv9tq9ztalrylsa6m4sjr6gqk3v6ecgsq7y076yxcx45ml0&#39;&gt;nevent1q…5ml0&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Accrescent comes from within the GrapheneOS community and we&amp;#39;re collaborating together.&lt;br/&gt;&lt;br/&gt;Accrescent is in alpha and isn&amp;#39;t yet open to any developers uploading their apps. It will have a lot more apps available in the future. It will become a full alternative to Play Store permitting closed source apps too, but you&amp;#39;ll be able to filter to show only open source apps for users who want this.&lt;br/&gt;
    </content>
    <updated>2024-07-20T23:32:24Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfdvew2fde7lm6tkfqz5m43xxugr998sxe7tfqchfv59uf2yehh3czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc26mxrwz</id>
    
      <title type="html">These details should tell you that if you consider these types of ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfdvew2fde7lm6tkfqz5m43xxugr998sxe7tfqchfv59uf2yehh3czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc26mxrwz" />
    <content type="html">
      These details should tell you that if you consider these types of groups (sophisticated adversaries with limitless physical access) as a part of your threat model, then you should:&lt;br/&gt;&lt;br/&gt;- Use the most recent phone you possibly can&lt;br/&gt;&lt;br/&gt;- Upgrade your phone to the newest possible generation as soon as possible after release if you can help it.&lt;br/&gt;&lt;br/&gt;- Use the latest version of GrapheneOS ASAP. Do not delay.&lt;br/&gt;&lt;br/&gt;- Use a strong, high entropy passphrase to make bruteforcing the device credential impossible if secure element is ever exploited.&lt;br/&gt;&lt;br/&gt;- Set GrapheneOS auto reboot time accordingly so encrypted data goes back at rest when the phone reboots, which makes AFU exploitation impossible. The lower the better.&lt;br/&gt;&lt;br/&gt;- Enable duress password. Set it to something easy to trigger but not easy to misfire.&lt;br/&gt;&lt;br/&gt;- Turn your phone off in a high risk situation, and trigger duress when in a duress situation.&lt;br/&gt;&lt;br/&gt;- Disable your radios when not using them (turn off Wi-Fi, use airplane mode, disable NFC, UWB etc.) for attack surface reduction.&lt;br/&gt;&lt;br/&gt;- Set an appropriate USB port control or disable the USB port so they aren&amp;#39;t able to connect a device to it.&lt;br/&gt;&lt;br/&gt;- Use user profiles (application data and user files within profiles are stored encrypted with separate credentials).&lt;br/&gt;&lt;br/&gt;- Enable upcoming GrapheneOS security features like second factor authentication unlock when they come out.&lt;br/&gt;&lt;br/&gt;- Communicate only over secure messaging. Some apps like Molly (Signal fork) have features to encrypt the app storage with a passphrase, which access to that app&amp;#39;s data impossible even when a profile is compromised  providing the passphrase is secure enough.&lt;br/&gt;&lt;br/&gt;- Become disassociated to data. Learn to only keep files or other data as long as it is necessary. If you have no use for them for a long time, then back it up elsewhere, encrypted. Delete anything you don&amp;#39;t have a use for in the present. Your data is not your memories. &lt;br/&gt;&lt;br/&gt;- Remember that you are only as secure as the people you trust. If they do not meet your safety or security requirements, don&amp;#39;t enable them to do things that could cause trouble.&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqs8uxurjncnpj8uyzqy5gd3lyevzd8u92xhk2xe9fdln5y03hgwrwgpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygxptfdxtxrw026pxn0w82u9y4x6t3w5kp883d83djpgxuvj6d23s5psgqqqqqqsgwaf3p&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…af3p&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; We published the Cellebrite Premium documentation from April 2024 in May 2024.&lt;br/&gt;&lt;br/&gt;Our thread properly explained the info in the tables including their inability to exploit Pixel 6 or later secure element and only partially bypass it on iPhone 12 or later at that current period of time.&lt;br/&gt;&lt;br/&gt;Cellebrite was a few months behind on supporting the latest iOS versions. It&#39;s common for them to fall a few months behind for the latest iOS and quarterly/yearly Android releases. They&#39;ve had April, May, June and July to advance further. It&#39;s wrong to assume capabilities didn&#39;t change for the later iPhones.&lt;br/&gt;&lt;br/&gt;404media published an article about the leaked documentation this week but it doesn&#39;t go into depth analyzing the leaked information as we did, but it didn&#39;t make any major errors. Many news publications are now writing highly inaccurate articles about it following that coverage.&lt;br/&gt;&lt;br/&gt;The detailed Android table showing the same info as iPhones for Pixels wasn&#39;t included in the article. Other news publications appear to be ignoring the leaked docs and our thread linked by 404media with more detail. They&#39;re only paraphrasing that article and making assumptions.&lt;br/&gt;&lt;br/&gt;The person who shared it with 404media is one of our community members. We regularly get sent this kind of information. In the case of XRY from MSAB, we were able to report several Android vulnerabilities based on their docs which are now fixed on Pixels but not elsewhere yet.&lt;br/&gt;&lt;br/&gt;We received Cellebrite&#39;s April 2024 Android and iOS support documents in April and from another source in May before publishing it. Someone else shared those and more documents on our forum. It didn&#39;t help us improve GrapheneOS, but it&#39;s good to know what we&#39;re doing is currently working.&lt;br/&gt;&lt;br/&gt;It would be a lot more helpful if people leaked the current code for Cellebrite, Graykey and XRY to us. We&#39;ll report all of the Android vulnerabilities they use whether or not they can be used against GrapheneOS. We can also make suggestions on how to fix vulnerability classes.&lt;br/&gt;&lt;br/&gt;In April, Pixels added a reset attack mitigation feature based on our proposal ruling out the class of vulnerability being used by XRY.&lt;br/&gt;&lt;br/&gt;In June, Pixels added support for wipe-without-reboot based on our proposal to prevent device admin app wiping bypass being used by XRY.&lt;br/&gt;&lt;br/&gt;In Cellebrite&#39;s docs, they show they can extract the iOS lock method from memory on an After First Unlock device after exploiting it, so the opt-in data classes for keeping data at rest when locked don&#39;t really work. XRY used a similar issue in their now blocked Android exploit.&lt;br/&gt;&lt;br/&gt;#GrapheneOS zero-on-free features appear to stop that data from being kept around after unlock. However, it would be nice to know what&#39;s being kept around. It&#39;s not the password since they have to brute force so it must be the initial scrypt-derived key or one of the hashes of it. &lt;/blockquote&gt;
    </content>
    <updated>2024-07-20T23:13:58Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8uxurjncnpj8uyzqy5gd3lyevzd8u92xhk2xe9fdln5y03hgwrwgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2q5m820</id>
    
      <title type="html">We published the Cellebrite Premium documentation from April 2024 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8uxurjncnpj8uyzqy5gd3lyevzd8u92xhk2xe9fdln5y03hgwrwgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2q5m820" />
    <content type="html">
      We published the Cellebrite Premium documentation from April 2024 in May 2024.&lt;br/&gt;&lt;br/&gt;Our thread properly explained the info in the tables including their inability to exploit Pixel 6 or later secure element and only partially bypass it on iPhone 12 or later at that current period of time.&lt;br/&gt;&lt;br/&gt;Cellebrite was a few months behind on supporting the latest iOS versions. It&amp;#39;s common for them to fall a few months behind for the latest iOS and quarterly/yearly Android releases. They&amp;#39;ve had April, May, June and July to advance further. It&amp;#39;s wrong to assume capabilities didn&amp;#39;t change for the later iPhones.&lt;br/&gt;&lt;br/&gt;404media published an article about the leaked documentation this week but it doesn&amp;#39;t go into depth analyzing the leaked information as we did, but it didn&amp;#39;t make any major errors. Many news publications are now writing highly inaccurate articles about it following that coverage.&lt;br/&gt;&lt;br/&gt;The detailed Android table showing the same info as iPhones for Pixels wasn&amp;#39;t included in the article. Other news publications appear to be ignoring the leaked docs and our thread linked by 404media with more detail. They&amp;#39;re only paraphrasing that article and making assumptions.&lt;br/&gt;&lt;br/&gt;The person who shared it with 404media is one of our community members. We regularly get sent this kind of information. In the case of XRY from MSAB, we were able to report several Android vulnerabilities based on their docs which are now fixed on Pixels but not elsewhere yet.&lt;br/&gt;&lt;br/&gt;We received Cellebrite&amp;#39;s April 2024 Android and iOS support documents in April and from another source in May before publishing it. Someone else shared those and more documents on our forum. It didn&amp;#39;t help us improve GrapheneOS, but it&amp;#39;s good to know what we&amp;#39;re doing is currently working.&lt;br/&gt;&lt;br/&gt;It would be a lot more helpful if people leaked the current code for Cellebrite, Graykey and XRY to us. We&amp;#39;ll report all of the Android vulnerabilities they use whether or not they can be used against GrapheneOS. We can also make suggestions on how to fix vulnerability classes.&lt;br/&gt;&lt;br/&gt;In April, Pixels added a reset attack mitigation feature based on our proposal ruling out the class of vulnerability being used by XRY.&lt;br/&gt;&lt;br/&gt;In June, Pixels added support for wipe-without-reboot based on our proposal to prevent device admin app wiping bypass being used by XRY.&lt;br/&gt;&lt;br/&gt;In Cellebrite&amp;#39;s docs, they show they can extract the iOS lock method from memory on an After First Unlock device after exploiting it, so the opt-in data classes for keeping data at rest when locked don&amp;#39;t really work. XRY used a similar issue in their now blocked Android exploit.&lt;br/&gt;&lt;br/&gt;#GrapheneOS zero-on-free features appear to stop that data from being kept around after unlock. However, it would be nice to know what&amp;#39;s being kept around. It&amp;#39;s not the password since they have to brute force so it must be the initial scrypt-derived key or one of the hashes of it.
    </content>
    <updated>2024-07-20T22:29:47Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs84wznrelu8x85tj44njgdy26xfn2q6m5rqmwag982svgzgzr3npczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vytgdc</id>
    
      <title type="html">Accrescent is alpha software (in terms of features) and likely ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs84wznrelu8x85tj44njgdy26xfn2q6m5rqmwag982svgzgzr3npczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2vytgdc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsd50svzknppxj69q2f8t3l98kh52yce0t5lqk5nfvhhaqq832umxsxjtpc3&#39;&gt;nevent1q…tpc3&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Accrescent is alpha software (in terms of features) and likely wouldn&amp;#39;t be appropriate to distribute it wider without further improvement. It is the maintainer&amp;#39;s choice. It would be better for the future.
    </content>
    <updated>2024-07-20T22:15:36Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9sx0ysuc443ryae4kwju5f7uyr6kr85wme8njwj8cryhcmfufvjqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ddyq3p</id>
    
      <title type="html">For outside GrapheneOS there&amp;#39;s https://accrescent.app</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9sx0ysuc443ryae4kwju5f7uyr6kr85wme8njwj8cryhcmfufvjqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2ddyq3p" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrhgdcjpmrf3w83dr9en9pkz7hvddv64a9k6qhyntcz3j0q7g44mcy3lm94&#39;&gt;nevent1q…lm94&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;For outside GrapheneOS there&amp;#39;s &lt;a href=&#34;https://accrescent.app&#34;&gt;https://accrescent.app&lt;/a&gt;
    </content>
    <updated>2024-07-20T20:35:37Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgahk6shdqr9lp3nmtzagyjulg25ax9xddlz7qsquvu5ltsgnvk9czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2dyv6gc</id>
    
      <title type="html">You will need to be on the latest GrapheneOS App Store, it may ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgahk6shdqr9lp3nmtzagyjulg25ax9xddlz7qsquvu5ltsgnvk9czyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2dyv6gc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsy4rk3dhxknlsa9pt6f0h9hpysnduarqtst9xrz6p2t8qnwvrrjks69haea&#39;&gt;nevent1q…haea&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;You will need to be on the latest GrapheneOS App Store, it may not have reached everyone yet. If you don&amp;#39;t have it then try select Beta and update. You are free to set it back to Stable after updating.
    </content>
    <updated>2024-07-20T18:29:30Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr90ncwqndlrumeh053lny0l3qgeq982mpj3wgywyuxp97xngnnuqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc29z0f5x</id>
    
      <title type="html">fyi I am aware of other projects using Hardened Malloc as well, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr90ncwqndlrumeh053lny0l3qgeq982mpj3wgywyuxp97xngnnuqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc29z0f5x" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgyarpvzd7l92c4yrstt0wx0ku6wfqj0uhrwmjreg2u8z5t4ugqrck70zzw&#39;&gt;nevent1q…0zzw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;fyi I am aware of other projects using Hardened Malloc as well, for example this hardened Void Linux build has hardened malloc and other hardening:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://0xacab.org/optout/plagueos&#34;&gt;https://0xacab.org/optout/plagueos&lt;/a&gt;&lt;br/&gt;&lt;a href=&#34;https://0xacab.org/optout/plagueos/-/wikis/Security-Considerations&#34;&gt;https://0xacab.org/optout/plagueos/-/wikis/Security-Considerations&lt;/a&gt;&lt;br/&gt;&lt;a href=&#34;https://0xacab.org/optout/plagueos/-/wikis/FAQ&#34;&gt;https://0xacab.org/optout/plagueos/-/wikis/FAQ&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;It sounds very interesting butI (and I think anyone I know) have never used it though. Can&amp;#39;t make a recommendation. Using smaller projects is at your own risk.
    </content>
    <updated>2024-07-20T11:35:56Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgyarpvzd7l92c4yrstt0wx0ku6wfqj0uhrwmjreg2u8z5t4ugqrczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2eh29le</id>
    
      <title type="html">The Chromium itself is still patched to disable data collection ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgyarpvzd7l92c4yrstt0wx0ku6wfqj0uhrwmjreg2u8z5t4ugqrczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2eh29le" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspays5gtn5r2kxggayngy5lnwj9d3z4hcjxa0znkz3arf9z795wtgr7xz4a&#39;&gt;nevent1q…xz4a&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The Chromium itself is still patched to disable data collection and opt-in metrics according to the developer and since it uses Vanadium patches I could attest to that. Always better to use the Chromium as a base and build with own patches rather than centipeding someone&amp;#39;s fork like ungoogled-chromium. Since if they delay, then you delay.&lt;br/&gt;&lt;br/&gt;These forks also aren&amp;#39;t security hardened like Vanadium is, forks will just amateurly take out anything that mentions Google which leads to some regressions.&lt;br/&gt;&lt;br/&gt;Secureblue is not endorsed but both have a similar user share and the maintainers are frequent GrapheneOS community members. It&amp;#39;s listed as an example of other OSes using hardened_malloc on our site.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s usable, but hardened_malloc will break certain apps the same way they do on GrapheneOS for security. Electron apps are an example. I don&amp;#39;t daily-driver secureblue though and the barrier for entry is higher than it is to get started with GrapheneOS.
    </content>
    <updated>2024-07-20T11:28:09Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9a29h7m7mwc4xu7q73yutn64ht3q9vehwlax3g8qkugewmf6un6gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2gcw64f</id>
    
      <title type="html">Brave is a top choice when it comes to content filtering and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9a29h7m7mwc4xu7q73yutn64ht3q9vehwlax3g8qkugewmf6un6gzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2gcw64f" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsv4rt064nec20t3a55wmm5gmpsjr3dyt7rtlfnsv6n4p4jrxzk4yq8fahpr&#39;&gt;nevent1q…ahpr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Brave is a top choice when it comes to content filtering and state partitioning. A big issue with Brave is how much, in my opinion, random nonsense they want you to use with it. Fortunately it never bugs you again once you disable it, but there could be better.&lt;br/&gt;&lt;br/&gt;Secureblue (security-hardened Fedora Atomic images) uses a hardened Chromium with Vanadium patches, but it&amp;#39;s part of Secureblue for the most part. It also uses our Hardened Malloc.
    </content>
    <updated>2024-07-19T22:34:04Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv7atu2gm0whj6selqgvj496ymdshccynkkklkwnjkqelk0fwxt9qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2rhd729</id>
    
      <title type="html">It&amp;#39;s mostly used explicitly by GrapheneOS users. It&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv7atu2gm0whj6selqgvj496ymdshccynkkklkwnjkqelk0fwxt9qzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2rhd729" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstkeuvf9d7yrzlvdr2zf4ztcrw99rs85wwjg2u276a3v8dgw7u3tsvchpa9&#39;&gt;nevent1q…hpa9&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;It&amp;#39;s mostly used explicitly by GrapheneOS users. It&amp;#39;s maintained by a supporting community member. Some strict security-focused users have been using it for a few years. I don&amp;#39;t expect this to be the first choice app store for people due to how limited the app catalog is, but it is worth us mirroring on our App Store so users can get it quickly, and because it is the what we consider choice for security and privacy.&lt;br/&gt;&lt;br/&gt;Future progress and adoption will hopefully change things
    </content>
    <updated>2024-07-19T16:18:48Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyecd47jmn47kv9tq9ztalrylsa6m4sjr6gqk3v6ecgsq7y076yxczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc206agph</id>
    
      <title type="html">While the app catalog is currently limited, it is the most ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyecd47jmn47kv9tq9ztalrylsa6m4sjr6gqk3v6ecgsq7y076yxczyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc206agph" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqk6j9r0f5vy72l7h2z7tzuysw9222waqm958wt5skjdlv2nr0tsg9q8t5j&#39;&gt;nevent1q…8t5j&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;While the app catalog is currently limited, it is the most private and secure option to get the apps that it has if you need them. Other apps we recommend like Molly (hardened Signal fork) also officially appear on Accrescent. Some popular apps you may recognise are AppVerifier, Aves Gallery, IVPN and ExifEraser (we do not make official ecommendations or endorsements for these apps or services, use at your own preference or risk).&lt;br/&gt;&lt;br/&gt;We may add our own builds of certain third party apps but we aren&amp;#39;t ready to do that yet. Would be a lot of work.
    </content>
    <updated>2024-07-19T16:03:17Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdzhvwmxva9w06kdhml94mu6r7n34xmz2yxe7t42qf4nn846e08kgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2tw5c5e</id>
    
      <title type="html">Accrescent is by their own team, I don&amp;#39;t work on it. We have ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdzhvwmxva9w06kdhml94mu6r7n34xmz2yxe7t42qf4nn846e08kgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2tw5c5e" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0zgm3n4q8kx0h5vku68a5exuz24cfxudue3q6fxw9kycjhcx6jeqvpwggf&#39;&gt;nevent1q…wggf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Accrescent is by their own team, I don&amp;#39;t work on it. We have now chosen to add the option to install on our Apps app. They are maintained by long-time GrapheneOS community members and it&amp;#39;s been designed for GrapheneOS users. We have been aware of the app for a few years.&lt;br/&gt; &lt;a href=&#34;https://github.com/accrescent/accrescent&#34;&gt;https://github.com/accrescent/accrescent&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;It was always in our interests to have a more secure app store option as we didn&amp;#39;t want F-Droid. Users are still free to install another app store of choice as Accrescent isn&amp;#39;t and won&amp;#39;t be bundled into GrapheneOS itself.
    </content>
    <updated>2024-07-19T15:56:04Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqk6j9r0f5vy72l7h2z7tzuysw9222waqm958wt5skjdlv2nr0tsgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2svu2z9</id>
    
      <title type="html">The #Accrescent security and privacy focused Android app store is ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqk6j9r0f5vy72l7h2z7tzuysw9222waqm958wt5skjdlv2nr0tsgzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2svu2z9" />
    <content type="html">
      The #Accrescent security and privacy focused Android app store is now available in the #GrapheneOS app store.&lt;br/&gt;&lt;br/&gt;Accrescent is a mobile security and privacy project that closely ties to our values. We hope the Accrescent project can benefit from having more users.&lt;br/&gt;&lt;br/&gt;Accrescent features:&lt;br/&gt;- App signing key pinning: first-time app installs are verified so you don&amp;#39;t have to TOFU.&lt;br/&gt;&lt;br/&gt;- Signed repository metadata: repository contents are protected against malicious tampering.&lt;br/&gt;&lt;br/&gt;-Automatic, unattended, unprivileged updates (Android 12&#43;): updates are handled seamlessly without relying on privileged OS integration.&lt;br/&gt;&lt;br/&gt;- Designed for split APKs: downloaded APKs are optimized for your device to save bandwidth.&lt;br/&gt;&lt;br/&gt;- No remote APK signing: developers are in full control of their app signing keys.&lt;br/&gt;&lt;br/&gt;- No account required: users don&amp;#39;t need an account to install apps, improving privacy.&lt;br/&gt;  &lt;img src=&#34;https://image.nostr.build/0a5a749032e0fb2aecefd1cf258e1bba535b69f66bade881f2202bd3f481b320.jpg&#34;&gt; 
    </content>
    <updated>2024-07-19T15:34:41Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstvftanml5gkrendwxm828gj7q28qvg25fnstc72gvs4hlc5gaqugzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2z560wz</id>
    
      <title type="html">GrapheneOS turns 10 this year, quality work takes time and all of ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstvftanml5gkrendwxm828gj7q28qvg25fnstc72gvs4hlc5gaqugzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2z560wz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxrxxt9gmgwn3rdz9yvxvah3kpm2rrv2ux0g8utcjzrxt3dj3s8wqs623rx&#39;&gt;nevent1q…23rx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;GrapheneOS turns 10 this year, quality work takes time and all of this definitely didn&amp;#39;t pop out of nowhere suspiciously. IMO this has been the best past 12 months for GrapheneOS so far. Several vuln disclosures, duress password, Vanadium content filtering and more in a small span of time. We definitely appreciate people coming to support GrapheneOS in droves the past 12 months.&lt;br/&gt;&lt;br/&gt;It wouldn&amp;#39;t make sense for us to be malicious for many reasons, not every GrapheneOS team member is working in private (e.g. the founder) and we have a Foundation registered in Canada with multiple directors. We participate with the broader cybersecurity community with vulnerability disclosures and such. There&amp;#39;s nothing wrong with concealing your identity but in our case, we have reputation and our professional lives on the line not to be evil. How we work is very different and open in comparison to real sting operations ran by governments or scam products owned by criminals.&lt;br/&gt;&lt;br/&gt;We dont deny certain people want to break us. We will never say we are impenetrable, but we are aware our work is targeted by threats aligned with governments such as in the leaked Cellebrite documentation where they discuss their failures with GrapheneOS. These people deceit the public with vague and misleading information to discredit us. Our effort the past year is down to fighting back on this attack and our fight is completely in the public eye for people to watch, we already survived a hostile takeover attempt, so we we&amp;#39;re very sure we&amp;#39;re here to stay.
    </content>
    <updated>2024-07-19T15:31:02Z</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqxg23rfj0ea7spr44dvve5yc4agrwjjdlpe3urs8g2aph0d7wnlqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2j7zpmv</id>
    
      <title type="html">I admit I&amp;#39;m curious to know what can be too good to be true ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqxg23rfj0ea7spr44dvve5yc4agrwjjdlpe3urs8g2aph0d7wnlqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2j7zpmv" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9qc2dyta4vms20sd77fvsef47n0r3dwscsw3m0qyf6z9az583rgscyg9ds&#39;&gt;nevent1q…g9ds&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I admit I&amp;#39;m curious to know what can be too good to be true about it? I know it&amp;#39;s partially a compliment but still curious.&lt;br/&gt;&lt;br/&gt;There is still a large amount of enhancements we would love to add and changes we want to make (see the roadmap on our site) so it surprises me people consider GrapheneOS at the current state to be too good.
    </content>
    <updated>2024-07-18T15:46:07Z</updated>
  </entry>

</feed>