![grapheneos](https://lemmy.ml/pictrs/image/R8RvOz05rd.png?format=webp&thumbnail=48)
GrapheneOS [Unofficial]
- App compatibility with GrapheneOSdiscuss.grapheneos.org App compatibility with GrapheneOS - GrapheneOS Discussion Forum
GrapheneOS discussion forum
A step-by-step troubleshooting guide for problematic apps with possible workaround solutions.
https://discuss.grapheneos.org/d/8330-app-compatibility-with-grapheneos
- GrapheneOS version 2024062700 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
Since Android 14 QPR3 is a major release, the end-of-life Pixel 4a (5G) and Pixel 5 receiving extended support releases from GrapheneOS will need to be ported to it with additional work in a future release, which is done as a low priority. Pixel 4a (5G) and Pixel 5 are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.
Tags:
- 2024062700 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
Changes since the 2024062000 release:
- add new GrapheneOS Info app through which you can get information about the latest releases of GrapheneOS, links to our community spaces, and details on how to make donations
- Pixel 8a: add Let's Encrypt roots to Samsung gnssd CA root store for supl.grapheneos.org
- Pixel 8a: configure Samsung gnssd to use TLSv1.2 for SUPL instead of TLSv1.1 (TLSv1.3 would work but the config doesn't offer it)
- Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold: fully remove 32-bit ARM support to significantly reduce build time and update download size with no loss of functionality (7th gen Pixels launched with 32-bit app support disabled after several years of the Play Store blocking uploading 32-bit-only apps or installing them on 64-bit devices, and 8th gen Pixels use 2nd gen ARMv9 cores with no 32-bit support
- Settings: fix several cases of UI state being lost when resuming activity after configuration changes, etc. for GrapheneOS settings
- kernel (5.10): update to latest GKI LTS branch revision including update to 5.10.216
- kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.90
- kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.35
- Vanadium: update to version 126.0.6478.122.0
- GmsCompatConfig: update to version 120
- GrapheneOS Info app version 2 releasedgithub.com Release 2 · GrapheneOS/Info
Notable changes in version 2: handle top bar title text overflow with ellipsis instead of wrapping handle rename of Twitter to X and replace twitter.com with x.com update AndroidX Compose UI libra...
Notable changes in version 2:
- handle top bar title text overflow with ellipsis instead of wrapping
- handle rename of Twitter to X and replace twitter.com with x.com
- update AndroidX Compose UI library to 1.7.0-beta04
- fixes for state restoration when resuming or changing configuration
A full list of changes from the previous release (version 1) is available through the Git commit log between the releases.
Releases of the app are published in the GrapheneOS app repository. You can use the GrapheneOS app repository client on Android 12 or later for automatic updates. Each release is initially pushed out through the Alpha channel, followed by the Beta channel and then finally the Stable channel.
- GrapheneOS Organization Counters Claims Made By Forensic Companiesgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
For more information on those 2 vulnerabilities: https://discuss.grapheneos.org/d/11860-vulnerabilities-exploited-in-the-wild-fixed-based-on-grapheneos-reports https://discuss.grapheneos.org/d/13494-cve-2024-32896-wipe-without-reboot-added-to-aosp-due-to-reports-by-grapheneos For detailed info on ...
https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/
"counterterrorism operation being conducted by a U.S.-allied Western government"
Selectively leaking info to sway public opinion is a classic move. Over 3 years after https://technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/, no info about which US ally or supposed terrorist group.
Here's an example of a "counterterrorism operation" by a U.S.-allied Western government targeting political opponents with NSO exploits:
Is this what's being referenced? Perhaps they mean the Polish government targeting the political opposition this way.
Is this the "counterterrorism operation" by a U.S.-allied Western government that's being referenced? If saying the country and "terrorist" group involved paints a flattering picture of these exploit tools, why aren't they saying which ones are involved?
A more extreme example of a US ally doing a "counterterrorism operation" using NSO exploits:
https://en.wikipedia.org/wiki/Assassination_of_Jamal_Khashoggi
Sure, not a "Western government". Does "U.S.-allied Western government" include Hungary, Turkey, Israel, Japan and South Korea? "Western" meaning what exactly?
Forensic data extraction tools are similar. They use exploits to extract data from devices. Many people claim that since they're primarily used by law enforcement it means they're primarily used for good. They're widely used to target arbitrary people at protests, borders, etc.
GrapheneOS is heavily focused on defending against both remote exploitation and local data extraction. As part of that work, we recently reported 2 vulnerabilities being actively exploited by forensic companies. These are now fixed for Pixels, but not yet other Android devices.
For more information on those 2 vulnerabilities:
https://discuss.grapheneos.org/d/11860-vulnerabilities-exploited-in-the-wild-fixed-based-on-grapheneos-reportshttps://discuss.grapheneos.org/d/13494-cve-2024-32896-wipe-without-reboot-added-to-aosp-due-to-reports-by-grapheneos
For detailed info on Cellebrite's capabilities based on leaked documentation which explicitly covers GrapheneOS:
We certainly support fixing these bugs...
- AOSP To Backport Critical Security Issues Reported By GrapheneOS Organizationgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
These patched vulnerabilities and other currently unpatched vulnerabilities are being exploited by forensic tools used by states to target journalists, political opponents, activists, arbitrary people crossing borders, etc. Sure, they target lots of drug users / dealers too...
https://grapheneos.social/@GrapheneOS/112609239806949074
We questioned why this was only listed in the Pixel Update Bulletin and they agree:
> After review we agree with your assessment that this is an Android issue and as such we are working on backports to include this in a future Android Security Bulletin.
April 2024 monthly update for Pixels included a partial mitigation for this vulnerability in firmware (CVE-2024-29748).
Android 14 QPR3 released in June 2024 includes a full solution for all Android devices by implementing the wipe-without-reboot proposal we made in our report.
The issue is that in practice, only Pixels ship the monthly and quarterly updates. Other devices only ship monthly security backports, not the monthly/quarterly releases of AOSP. They were only going to get the patch when they updated to Android 15. They're now going to backport.
The other vulnerability we reported at the same time for reset attacks was assigned CVE-2024-29745 but that's a firmware/hardware issue without a software solution available so we can't get them to include it in the Android Security Bulletin unless we convince Qualcomm to fix it.
Every vulnerability in the Android Open Source Project that's deemed to be High/Critical severity is meant to be backported to yearly releases from the past 3 years (currently Android 12, 13 and 14). Low/Moderate severity vulnerabilities are NOT generally backported though.
The issue is that they're really listing patches rather than vulnerabilities. Both of the vulnerabilities we originally reported impact all Android devices, but both got Pixel specific patches in April 2024 and therefore got treated as Pixel specific vulnerabilities instead.
Since the complete solution for the device admin API is an Android Open Source Project (AOSP) patch, they're going to backport it. Since there's no way to frame the reset attack issue as an AOSP issue, there isn't a good way to get it fixed for other devices through this system.
These patched vulnerabilities and other currently unpatched vulnerabilities are being exploited by forensic tools used by states to target journalists, political opponents, activists, arbitrary people crossing borders, etc. Sure, they target lots of drug users / dealers too...
- GrapheneOS Organization Notifies Community About Wise Payment Option Issues Now Being Resolvedgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
Wise has quietly started allowing people to add our EUR account and send us money again. https://grapheneos.social/deck/@GrapheneOS/112672843944152400 Issue appears to be fully resolved. Similarly to how they quietly started blocking that without any notice, it has stopped without a reply to our s...
Wise has quietly started allowing people to add our EUR account and send us money again.
https://grapheneos.social/deck/@GrapheneOS/112672843944152400
Issue appears to be fully resolved. Similarly to how they quietly started blocking that without any notice, it has stopped without a reply to our support request.
- GrapheneOS Organization Discusses Wise Payment Problemgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
Appears to be a Wise software bug causing our EUR account to show up as deleted to other Wise users, but it otherwise works for receiving from external banks and sending money. Wise's support staff simply appear to badly trained and stonewall referring to irrelevant AML policy.
Wise silently disabled adding our EUR account as a contact on Wise, blocking people from transferring us money on the platform. They're stonewalling us about it. We've received 3 donations via EUR today, so transfers from other banks to our Wise account are still working fine...
Wise's initial response was they're unable to talk to us about it for security/regulatory reasons and needed to talk to the people trying to send us money instead. Fine, but they stonewalled each of those people and said they couldn't say anything for security/regulatory reasons.
Wise won't tell us which of our accounts has disabled functionality or which functionality has been disabled. It only appears to impact receiving EUR via Wise, not sending it and not other currencies. We likely triggered a false positive and they simply default to stonewalling.
Our experience with financial services is that the only way to solve the problems is to post on social media about it, get significant traction and eventually someone who works with the company prods them internally to get it sorted out, which ends up being a quick/simple fix.
Appears to be a Wise software bug causing our EUR account to show up as deleted to other Wise users, but it otherwise works for receiving from external banks and sending money. Wise's support staff simply appear to badly trained and stonewall referring to irrelevant AML policy.
- New Info App Announced For GrapheneOSgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
We recently completely replaced the Setup Wizard shown during the initial installation with a modern replacement following the standard setup design style. We'll be adding more functionality there and our app repository to help people get started including obtaining their apps.
GrapheneOS Info app is now available through our app repository and will be included in the next release of the OS. It supports viewing recent OS release notes, provides info on our chat rooms, forum and active social media accounts along with offering all the donations methods. !Screenshot of the GrapheneOS Info app showing the latest 2024061400 release notes in the Release Notes tab. It also has tabs for Community and Donate. It's a modern Material 3 app design with Material You support.
This will be included in the next release of GrapheneOS. We also plan to make significant improvements to the other GrapheneOS apps in the near future. We'll also be working towards replacing or overhauling each of the user-facing AOSP apps as we already did with the Camera app.
We recently completely replaced the Setup Wizard shown during the initial installation with a modern replacement following the standard setup design style. We'll be adding more functionality there and our app repository to help people get started including obtaining their apps.
- Vanadium version 126.0.6478.122.0 releasedgithub.com Release 126.0.6478.122.0 · GrapheneOS/Vanadium
Changes in version 126.0.6478.122.0: update to Chromium 126.0.6478.122 A full list of changes from the previous release (version 126.0.6478.110.0) is available through the Git commit log between ...
Changes in version 126.0.6478.122.0:
- update to Chromium 126.0.6478.122
A full list of changes from the previous release (version 126.0.6478.110.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 120 releasedgithub.com Release config-120 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 120: update max supported version of Play Store to 41.5 A full list of changes from the previous release (version 119) is available through the Git commit log between the relea...
Changes in version 120:
- update max supported version of Play Store to 41.5
A full list of changes from the previous release (version 119) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- Improved USB Port Attack Surface Reduction Releasedgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
Several operating systems previously included a port of our legacy software-based approach and mistakenly moved to the less secure approach of disabling USB via the standard USB HAL after the last USB connection ends. It's less secure than simply extending our legacy feature...
Our latest release improves our hardware-based USB-C port attack surface reduction. Our previous software-based feature has been extended and merged into it as a 2nd layer of enforcement. We've also extended it to disable pogo pins data at a hardware level on the Pixel Tablet.
Our previous feature is now fully obsolete and has been removed on devices with the newer approach, which is a nice simplification. We've rewritten the documentation here:
https://grapheneos.org/features#usb-c-port-and-pogo-pins-control
Older approach is now only used on the Pixel 5a and earlier end-of-life devices.
Our documentation explains why our approach is much better than the standard Android USB HAL toggle available to device admin apps since Android 12. Standard approach only disables USB connections in the OS. It leaves USB-C and pogo pins enabled at both the OS and hardware level.
The standard approach also can't block new USB connections without ending existing USB connections. It has no distinction between those things. It forces a choice between ending existing USB connections when locking or delaying using it at all until the last USB connection ends.
Several operating systems previously included a port of our legacy software-based approach and mistakenly moved to the less secure approach of disabling USB via the standard USB HAL after the last USB connection ends. It's less secure than simply extending our legacy feature...
- GrapheneOS version 2024062000 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
Since Android 14 QPR3 is a major release, the end-of-life Pixel 4a (5G) and Pixel 5 receiving extended support releases from GrapheneOS will need to be ported to it with additional work in a future release, which is done as a low priority. Pixel 4a (5G) and Pixel 5 are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.
Tags:
- 2024062000 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
Changes since the 2024061400 release:
- remove our USB peripheral security setting on devices supporting our much better USB-C port mode (Pixel 6 and later)
- extend USB-C port setting to also handle pogo pins on the Pixel Tablet
- kernel (5.10, 5.15, 6.1, 6.6): replace our deny_new_usb feature with a new deny_new_usb2 feature also disabling USB gadgets
- extend USB-C port setting to enable deny_new_usb2 as a second layer of defense disabling new USB connections in the kernel (the existing implementation disables new connections and USB data at a hardware level via the USB controller, which disables more attack surface, but we want to keep around the higher level kernel approach too)
- Files: fix upstream null pointer exception triggered on resuming activity
- Settings: require user authentication for changing auto-reboot, USB peripheral and USB-C port security settings
- Settings: avoid prompting for user authentication when selecting the same value as before for GrapheneOS settings requiring it
- temporarily add back memory tagging exception for Pixel wifi_ext service
- simplify implementation of our auto-reboot feature and properly handle the first lock after the user first sets up a lock method
- avoid resetting USB-C port after first unlock if it was already connected Before First Unlock (fix for regression caused by upstream changes)
- add GrapheneOS Linux kernel port to the 6.6 GKI LTS branch
- kernel (5.10): update to latest GKI LTS branch revision including update to 5.10.215
- kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.87
- kernel (6.1, 6.6): add script for building emulator kernel
- kernel (6.1, 6.6): enable forced module signing for x86_64 (emulator builds)
- System Updater: increase update check interval to 6 hours from 4 hours
- Vanadium: update to version 126.0.6478.110.0
- GmsCompatConfig: update to version 118
- GmsCompatConfig: update to version 119
- fix cast in GrapheneOS package management infrastructure needed for upcoming App Communication Scopes work
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 119 releasedgithub.com Release config-119 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 119: add stub for WifiManager.getSoftApConfiguration() A full list of changes from the previous release (version 118) is available through the Git commit log between the releas...
Changes in version 119:
- add stub for WifiManager.getSoftApConfiguration()
A full list of changes from the previous release (version 118) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- Vanadium version 126.0.6478.110.0 releasedgithub.com Release 126.0.6478.110.0 · GrapheneOS/Vanadium
Changes in version 126.0.6478.71.0: update to Chromium 126.0.6478.110 A full list of changes from the previous release (version 126.0.6478.110.0) is available through the Git commit log between t...
Changes in version 126.0.6478.71.0:
- update to Chromium 126.0.6478.110
A full list of changes from the previous release (version 126.0.6478.110.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 118 releasedgithub.com Release config-118 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 118: update max supported version of Play services to 24.23 update max supported version of Play Store to 41.4 update Android Gradle plugin to 8.5.0 A full list of changes from...
Changes in version 118:
- update max supported version of Play services to 24.23
- update max supported version of Play Store to 41.4
- update Android Gradle plugin to 8.5.0
A full list of changes from the previous release (version 117) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- GrapheneOS Organization Discusses This Months QPR3 Release Improvements For TEEgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
This is closely related to publishing the rest of the Trusty code used for Pixels, since they implement communication using authenticated encryption between the SoC secure core and the standalone secure element. Non-Pixel Android ecosystem could benefit a lot from all this code.
Pixel 6 and later use the open source Trusty OS for the Trusted Execution Environment (TrustZone) and secure core firmware.
Starting with this month's quarterly release (Android 14 QPR3), Trusty sources and baseline applets are part of the Android Open Source Project in trusty/.
Not everything is published, particularly Tensor specific portions. It'd be helpful to publish the rest to make it easier to audit and propose improvements.
They still need to publish the Titan M2 fork of OpenTitan too, which they committed to eventually doing several years ago.
OpenTitan was created to replace their secure elements based on ARM secure cores with a custom RISC-V design across their servers, Chromebooks and Pixel phones/tablets. Pixel 6 and later have a RISC-V secure element (Titan M2), but they still need to publish Pixel specific code.
Upstream OpenTitan project is currently focused on implementing the TPM specification for desktop/server use. TPM is a horrible secure element API. It isn't what's used on Pixels where they got to design APIs for usage by the Android Open Source Project based on what it needs.
This is closely related to publishing the rest of the Trusty code used for Pixels, since they implement communication using authenticated encryption between the SoC secure core and the standalone secure element. Non-Pixel Android ecosystem could benefit a lot from all this code.
- GrapheneOS version 2024061400 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
Tags:
- 2024061400 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
Changes since the 2024061300 release:
- revert upstream refactoring of the device association code in Android 14 QPR3 due to it introducing a chain crash bug at boot in edge cases with associated devices such as paired Android Wear devices
- kernel (5.10): update to latest GKI LTS branch revision Vanadium: update to version 126.0.6478.71.0
- GrapheneOS Planned Release For Today To Resolve Upstream Regressiongrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
If you don't depend on Bluetooth, you might as well update to the current OS release in the Beta channel and then switch back to Stable. Only reason it's not in the Stable channel yet is these 2 issues. There's another minor upstream Settings UI style issue which doesn't matter.
We've found a serious bug in Android 14 QPR3 which can lead to devices getting stuck in a crash loop on boot after adding a device association such as a WearOS pairing. This impacts both stock Pixel OS and AOSP. Google is aware and reverted the broken change in Android 15 Beta 2.
Today, we plan to do a release fixing this serious issue and the AOSP Bluetooth module regression breaking pairing with the Galaxy Watch6 device we purchased for testing due to previous Bluetooth regressions in Android 14 QPR2 breaking it. Today's release should reach Stable.
If you don't depend on Bluetooth, you might as well update to the current OS release in the Beta channel and then switch back to Stable. Only reason it's not in the Stable channel yet is these 2 issues. There's another minor upstream Settings UI style issue which doesn't matter.
- Vanadium version 126.0.6478.71.0 releasedgithub.com Release 126.0.6478.71.0 · GrapheneOS/Vanadium
Changes in version 126.0.6478.71.0: update to Chromium 126.0.6478.71 set default toolbar shortcut to new tab A full list of changes from the previous release (version 126.0.6478.50.1) is availabl...
Changes in version 126.0.6478.71.0:
- update to Chromium 126.0.6478.71
- set default toolbar shortcut to new tab
A full list of changes from the previous release (version 126.0.6478.50.1) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GrapheneOS version 2024061300 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
We've found at least one new issue with the Android Open Source Project 14 QPR3 Bluetooth module and are already working on resolving it. We'll have a quick follow-up release fixing the Bluetooth regression and other issues discovered during public Alpha testing.
Tags:
- 2024061300 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
Changes since the 2024061200 release:
- fix upstream Android 14 QPR3 regression which breaks updating certain apps with our app repository client
- fix boot-time optimizing apps progress UI with Android 14 QPR3 and enable it again
- fix regression in our Android 14 QPR3 port resulting in PIN scrambling in secondary users being determined by the Owner user setting
- revert major upstream Android 14 QPR3 Internet quick tile overhaul since it broke the functionality in secondary users
- temporarily add back disabling memory tagging and hardened_malloc for surfaceflinger since Android 14 QPR3 didn't fix it as expected
- disable temporary unconditional system crash notifications since we've gotten the initial feedback we needed via the previous release
- add additional null check for eSIM wiping done as part of the duress PIN/password wipe implementation to avoid harmless exception
- Settings: remove blank illustration from "Screen resolution" screen
- Vanadium: update to version 126.0.6478.50.1
- make duress PIN/password tests faster and more reliable
- GrapheneOS Organization Discusses Upstream Chromium Breakages and Asks For Help With App Testing From Communitygrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
There are a lot of people helping with testing the OS releases in the Alpha and Beta channels, but very few people helping with the apps. We expect most people aren't aware there are Alpha and Beta channels for the app repository too, since it's tucked away in the Apps menu.
Chromium v126 broke support for the built-in password manager on Android. We've fixed it in Vanadium 126.0.6478.50.1:
https://grapheneos.social/@GrapheneOS/112609618525601248
We'll be filing a Chromium issue. We've had success reporting similar regressions for Android operating systems without Google Play.
We'd greatly appreciate if more GrapheneOS users helped with the Alpha/Beta testing of Vanadium releases. Can enable the Alpha/Beta channel by selecting Vanadium in the app repository client (Apps) and changing release channel with the menu. We might need to make it more visible.
If you decide to help with testing for our apps or the OS, please join our Alpha/Beta testing chat room and report regressions there right away. See https://grapheneos.org/contact#community-chat for details. Can use Matrix, Discord, Telegram or even IRC (libera.chat) since it's bridged.
There are a lot of people helping with testing the OS releases in the Alpha and Beta channels, but very few people helping with the apps. We expect most people aren't aware there are Alpha and Beta channels for the app repository too, since it's tucked away in the Apps menu.
- Vanadium version 126.0.6478.50.1 releasedgithub.com Release 126.0.6478.50.1 · GrapheneOS/Vanadium
Changes in version 126.0.6478.50.1: restore past Password Manager settings behavior from before v126, although Chromium has deprecated it with the intention to remove it in 6 months so we'll need ...
Changes in version 126.0.6478.50.1:
- restore past Password Manager settings behavior from before v126, although Chromium has deprecated it with the intention to remove it in 6 months so we'll need to talk to them about it
- enable feature flag for passkey support (already handled via Vanadium Config update)
- enable skipping autofill compatibility checks (already handled via Vanadium Config update)
- explicitly disable include_both_v8_snapshots for the upcoming v127 release since it will increase build time and APK size for a feature that's only available as an opt-in experiment
A full list of changes from the previous release (version 126.0.6478.50.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- CVE-2024-32896: wipe-without-reboot added to AOSP due to reports by GrapheneOS Organizationgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
We have a thread about forensic company capabilities at https://grapheneos.social/@GrapheneOS/112462756293586146 based on leaked Cellebrite documentation. Shows GrapheneOS does a much better job than iOS/Android blocking exploits and only Pixel 6 and later or iPhone 12 and later successfully stop br...
CVE-2024-32896 which is marked as being actively exploited in the wild in the June 2024 Pixel Update Bulletin is the 2nd part of the fix for CVE-2024-29748 vulnerability we described here:
https://grapheneos.social/@GrapheneOS/112204428984003954
As we explained there, none of this is actually Pixel specific.
Bulletin:
https://source.android.com/docs/security/bulletin/pixel/2024-06-01
Attribution to us:
https://source.android.com/docs/security/overview/acknowledgements
CVE-2024-32896 and CVE-2024-29748 refer to the same vulnerability of interrupting reboot for wipes via the device admin API, which applies to all devices.
CVE-2024-32896 is a full fix in AOSP as part of Android 14 QPR3. It's not at all Pixel specific.
This is being widely incorrectly reported in tech news coverage. Pixel Update Bulletins are almost entirely patches for vulnerabilities which apply to other devices too. Android Security Bulletins are the list of what other OEMs are required to fix, not the full list of patches.
We explained this in our previous thread:
https://grapheneos.social/@GrapheneOS/112204437363495338
CVE-2024-29748 was a mitigation for the issue implemented in the Pixel bootloader. Full solution is implementing wipe-without-reboot, which is now a standard feature in Android 14 QPR3 released as part of AOSP.
Our 2024052100 release backported the upstream wipe-without-reboot feature being shipped in the June 2024 release of Android (Android 14 QPR3): https://grapheneos.org/releases#2024052100.
We extended it to make it more robust via extra redundancy in our 2024060400 release: https://grapheneos.org/releases#2024060400.
There were 2 main issues:
- memory not wiped when booting firmware-based fastboot mode, allowing exploiting it to get previous OS memory
- AOSP device admin API depends on reboot-to-recovery to wipe before Android 14 QPR3
Neither is issue is being fixed outside Pixels yet.
Each month, Android has a new version released. These are the monthly, quarterly (QPR) and yearly releases. The baseline monthly security patches are NOT the monthly releases of Android. They're backports of a SUBSET of the patches with High/Critical severity, not all patches.
Most devices only ship the backported patches to older Android releases (12, 13 and 14). Pixels ship the monthly, quarterly and yearly releases. Other devices will mostly get the 2nd vulnerability fix when they update to Android 15. They'll have to fix the 1st issue on their own.
We have a thread about forensic company capabilities at https://grapheneos.social/@GrapheneOS/112462756293586146 based on leaked Cellebrite documentation. Shows GrapheneOS does a much better job than iOS/Android blocking exploits and only Pixel 6 and later or iPhone 12 and later successfully stop brute forcing.
- GrapheneOS version 2024061200 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
This is the first release of GrapheneOS based on Android 14 QPR3, the 3rd quarterly maintenance/feature release for Android 14.
We've found at least one new issue with the Android Open Source Project 14 QPR3 Bluetooth module and are already working on resolving it. We'll have a quick follow-up release fixing the Bluetooth regression and other issues discovered during public Alpha testing.
Pixel 8a is now supported as part of the standard Android releases instead of having a device branch based on Android 14 QPR1. We've had stable releases for it available since May 15th (1 day after launch) based on our last QPR1-based release (2024030300). Pixel 8a users will be getting the GrapheneOS improvements from March, April, May and June along with the Android 14 QPR2 and QPR3 improvements so it's a much larger release for the Pixel 8a.
Tags:
- 2024061200 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
Changes since the 2024060500 release:
- full 2024-06-05 security patch level
- rebased onto AP2A.240605.024 Android Open Source Project release, which is the 3rd quarterly maintenance/feature release for Android 14 (QPR3)
- temporarily enable system crash notifications unconditionally for the initial QPR3-based release
- change default USB-C port mode to "Charging-only when locked", from "Charging-only when locked, except before first unlock"
- stop disabling memory tagging and hardened_malloc for surfaceflinger
- Settings: fix regression permitting disabling apps when it shouldn't be allowed due to device manager policy
- Vanadium: update to version 126.0.6478.50.0
- GmsCompatConfig: update to version 117
- Vanadium version 126.0.6478.50.0 releasedgithub.com Release 126.0.6478.50.0 · GrapheneOS/Vanadium
Changes in version 126.0.6478.50.0: update to Chromium 126.0.6478.50 A full list of changes from the previous release (version 125.0.6422.165.0) is available through the Git commit log between th...
Changes in version 126.0.6478.50.0:
- update to Chromium 126.0.6478.50
A full list of changes from the previous release (version 125.0.6422.165.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 117 releasedgithub.com Release config-117 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 117: update max Play services version to 24.22 for GmsCompat >= 1008 update max supported version of Play Store to 41.3 A full list of changes from the previous release (versio...
Changes in version 117:
- update max Play services version to 24.22 for GmsCompat >= 1008
- update max supported version of Play Store to 41.3
A full list of changes from the previous release (version 116) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- GrapheneOS version 2024060500 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
Pixel 4a (5G) and Pixel 5 are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.
Tags:
- 2024060500-redfin (Pixel 4a (5G), Pixel 5)
- 2024060500 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, emulator, generic, other targets)
Changes since the 2024060400 release:
- Sandboxed Google Play compatibility layer: adjust to DynamiteLoader changes being deployed with a new feature flag in Play services 24.22
- stop treating pressing the spacebar on a physical keyboard as submitting the lockscreen password since it prevents entering passphrases with spaces (upstream Android bug which has existed for around 8.5 years)
- Vanadium: update to version 125.0.6422.165.0
- GmsCompatConfig: update to version 116
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 116 releasedgithub.com Release config-116 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 116: reduce max supported version of Play services to 24.21 until we resolve a regression with a new feature flag update Gradle to 8.8 A full list of changes from the previous ...
Changes in version 116:
- reduce max supported version of Play services to 24.21 until we resolve a regression with a new feature flag
- update Gradle to 8.8
A full list of changes from the previous release (version 115) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- Vanadium version 125.0.6422.165.0 releasedgithub.com Release 125.0.6422.165.0 · GrapheneOS/Vanadium
Changes in version 125.0.6422.165.0: update to Chromium 125.0.6422.165 A full list of changes from the previous release (version 125.0.6422.147.0) is available through the Git commit log between ...
Changes in version 125.0.6422.165.0:
- update to Chromium 125.0.6422.165
A full list of changes from the previous release (version 125.0.6422.147.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GrapheneOS version 2024060400 releasedgrapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
This is an early June security update release based on the May 2024 security patch backports since this month's release of the Android Open Source Project and stock Pixel OS with Android 14 QPR3 isn't available yet.
Pixel 4a (5G) and Pixel 5 are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.
Tags:
- 2024060400-redfin (Pixel 4a (5G), Pixel 5)
- 2024060400 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, emulator, generic, other targets)
Changes since the 2024053100 release:
- full 2024-06-01 security patch level
- extend the standard wipe-without-reboot implementation beyond wiping the hardware keystores (which prevents recovering any OS data by preventing deriving the key encryption keys) by also wiping the secdiscardable data on the SSD needed to derive key encryption keys, the encrypted storage keys on the SSD and the Weaver slots in the secure element needed to derive per-user key encryption keys via a secure element erase
- kernel (5.10): update to latest GKI LTS branch revision
- kernel (5.15): update to latest GKI LTS branch revision
- kernel (6.1): update to latest GKI LTS branch revision
- GrapheneOS Now Supports a Duress Reset PIN and Moregrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
Our upcoming 2-factor fingerprint unlock will make using a strong passphrase as primary unlock method practical via fingerprint+PIN secondary unlock instead of fingerprint-only. Great for people who want to avoid relying on secure element throttling but don't want fp-only unlock.
Latest release of GrapheneOS finally shipped the long awaited duress PIN/password implementation. If you have a spare device, we recommend trying it out.
We've added initial documentation to the features page:
https://grapheneos.org/features#duress
It near instantly wipes and shuts down.
We've also finally added documentation on our USB-C port control to our features page:
https://grapheneos.org/features#usb-c-port-control
Most users can set this to "Charging-only when locked" without a loss of functionality or even "Charging-only" if you don't use USB accessories, DisplayPort or MTP.
Default is "Charging-only when locked, except before first unlock" to avoid locking users out of devices with a broken touchscreen. The main threat model for this is defending the device until the auto-reboot timer started when the screen is locked gets user data back at rest.
Our upcoming 2-factor fingerprint unlock will make using a strong passphrase as primary unlock method practical via fingerprint+PIN secondary unlock instead of fingerprint-only. Great for people who want to avoid relying on secure element throttling but don't want fp-only unlock.
- GrapheneOS version 2024053100 released (SUPPORTS DURESS PASSWORD)grapheneos.org GrapheneOS releases
Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.
Pixel 4a (5G) and Pixel 5 are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.
Tags:
- 2024053100-redfin (Pixel 4a (5G), Pixel 5)
- 2024053100 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, emulator, generic, other targets)
Changes since the 2024052100 release:
- add support for setting a duress password and PIN for quickly wiping all hardware keystore keys including keys used as part of deriving the key encryption keys for disk encryption to make all OS data unrecoverable followed by wiping eSIMs and then shutting down
- disable unused adoptable storage support since it would complicate duress password feature (can be added if we ever support a device able to use it)
- increase default max password length to 128 to improve support for strong diceware passphrases, which will become more practical for people who don't want biometric-only secondary unlock with our upcoming 2-factor fingerprint unlock feature
- disable camera lockscreen shortcut functionality when camera access while locked is disabled to avoid the possibility of misconfiguration by adding the camera lockscreen shortcut and then forgetting to remove it when disabling camera access
- kernel (5.15): update to latest GKI LTS branch revision including update to 5.15.153
- kernel (6.1): update to latest GKI LTS branch revision
- Vanadium: update to version 125.0.6422.72.0
- Vanadium: update to version 125.0.6422.72.1
- Vanadium: update to version 125.0.6422.113.0
- Vanadium: update to version 125.0.6422.147.0
- GmsCompatConfig: update to version 112
- GmsCompatConfig: update to version 113
- GmsCompatConfig: update to version 114
- GmsCompatConfig: update to version 115
- make SystemUI tests compatible with GrapheneOS changes
- GrapheneOS Organization Discusses Planned Accessibility Improvementsgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
So far, only EU banks appear to be doing this which is convenient since we already have contact with the EU Commission with a focus on the anti-competitive Play Integrity API many banks have adopted. They're not going to be impressed by banks banning open source screen readers...
GrapheneOS has been working towards providing accessibility for blind users so we include our own build of TalkBack. We plan to include a text-to-speech (TTS) app and Setup Wizard integration to make it usable out-of-the-box. We can't do much to make installing more accessible.
Unfortunately, some banks are trying to make life harder for blind people and others reliant on accessibility services. A few have started banning using their app if a non-Google accessibility service app is installed, even if it's not activated (TalkBack is off by default).
Our users have determined that this is easy to work around by disabling the app rather than the accessibility service not being activated. It's possible for those apps to see that it's not activated and they can see it's a first party OS component so it makes very little sense.
We've been working on an App Communication Scopes feature for disallowing apps from seeing or communicating with apps in the same profile with toggles to allow specific cases. We have some of the infrastructure in the OS already for specific cases and can start using it for this.
So far, only EU banks appear to be doing this which is convenient since we already have contact with the EU Commission with a focus on the anti-competitive Play Integrity API many banks have adopted. They're not going to be impressed by banks banning open source screen readers...
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 115 releasedgithub.com Release config-115 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 115: update max supported version of Play services to 24.22 update max supported version of Play Store to 41.2 A full list of changes from the previous release (version 114) is...
Changes in version 115:
- update max supported version of Play services to 24.22
- update max supported version of Play Store to 41.2
A full list of changes from the previous release (version 114) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- Vanadium version 125.0.6422.147.0 releasedgithub.com Release 125.0.6422.147.0 · GrapheneOS/Vanadium
Changes in version 125.0.6422.147.0: update to Chromium 125.0.6422.147 A full list of changes from the previous release (version 125.0.6422.113.0) is available through the Git commit log between ...
Changes in version 125.0.6422.147.0:
- update to Chromium 125.0.6422.147
A full list of changes from the previous release (version 125.0.6422.113.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 114 releasedgithub.com Release config-114 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 114: add stub for BluetoothManager.openGattServer() A full list of changes from the previous release (version 113) is available through the Git commit log between the releases ...
Changes in version 114:
- add stub for BluetoothManager.openGattServer()
A full list of changes from the previous release (version 113) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- Vanadium version 125.0.6422.113.0 releasedgithub.com Release 125.0.6422.113.0 · GrapheneOS/Vanadium
Changes in version 125.0.6422.113.0: update to Chromium 125.0.6422.113 A full list of changes from the previous release (version 125.0.6422.72.1) is available through the Git commit log between t...
Changes in version 125.0.6422.113.0:
- update to Chromium 125.0.6422.113
A full list of changes from the previous release (version 125.0.6422.72.1) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.
- GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 113 releasedgithub.com Release config-113 · GrapheneOS/platform_packages_apps_GmsCompat
Changes in version 113: update max supported version of Play services to 24.20 update max supported version of Play Store to 41.1 new approach for development builds to avoid deprecation warning ...
Changes in version 113:
- update max supported version of Play services to 24.20
- update max supported version of Play Store to 41.1
- new approach for development builds to avoid deprecation warning
A full list of changes from the previous release (version 112) is available through the Git commit log between the releases (only changes to the
gmscompat_config
text file andconfig-holder/
directory are part of GmsCompatConfig).This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.
- GrapheneOS Organization Discusses Issues With Upstream Linux Kernelgrapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)
We're unconvinced that the Linux kernel is headed in the right direction. It's not truly getting more robust or secure. The accelerating complexity and churn is opposed to both, as are the culture and tools. We're hitting more issues including on our workstations and servers.
Linux kernel becoming their own CVE Numbering Authority (CNA) is wasting resources they'd have previously put towards higher quantity and quality backporting. We've noticed a drop in both for the stable/longterm branches and particularly Android Generic Kernel Image LTS branches.
We've had around 2.5 years to evaluate impact of Generic Kernel Images. Our conclusion is that this caused more harm than good to GrapheneOS.
Generic Kernel Images are supposed to make kernel updates easier via a stable ABI, but Pixels update all drivers for GKI updates anyway.
The stability of the ABI isn't perfect and many changes get reverted due to breaking the ABI. It also leads to even the GKI LTS branch with the latest merges of LTS releases to lag behind, particularly recently. We attribute some of that to the resources wasted on their CNA work.
CVE system did not work for the Linux kernel either way, but it's certainly not fixed through making nearly every backport into a CVE and ignoring anything not backported. We don't particularly care about it but rather our concern is wasting scarce resources on something useless.
Barely any resources are dedicated to stable Linux kernel releases. There's very little testing and review. There have been multiple filesystem corruption bugs backported to ext4 and f2fs recently. Some didn't exist in mainline but rather are from missing interdependent changes.
GKI LTS branch reverting a bunch of commits changing the ABI, working around the changed ABI in other cases and lagging behind is making it harder for us to deal with these issues. It'd be smoother upgrading the kernel and fixing API/ABI conflicts. ABI isn't fully stable anyway.
Android reached the point where mainline kernels were usable beyond needing out-of-tree drivers for hardware and the Tensor Pixel drivers are way less invasive and easier to port to new releases. GKI has made a mess of it, and it doesn't even make it easier for Pixels but harder.
5.10 kernel drivers for Pixel 6 were ported to 5.15, 6.1 and 6.6. They simply haven't decided to move to a newer branch yet. The kernel for Pixel 8 doesn't bother having a device kernel tree anyway but rather uses generic sources for GKI and all the drivers, so what's the point?
We're increasingly scared of updating LTS revisions and it does not help that the GKI LTS branch is lagging a bit behind since it's not lagging behind due to any further stabilization but rather lack of resources to keep up. Any LTS revision with f2fs changes is terrifying now.
Unlike the stock Pixel OS, we've avoided shipping common f2fs corruption bugs in production by being way ahead on LTS adoption while narrowing avoiding shipping new serious issues. Has been way too close for comfort and we have low confidence in any LTS release with f2fs changes.
Generic Kernel Images have directly interfered with both hardening and performance due to the impact of vendor hooks working around not being able to change core kernel code. We don't want dynamic kernel modules but we're essentially forced into using them to avoid init bugs.
They've made the usual mistake of burning resources on branches by having 2 variants of each LTS branch (Android 12/13 variants of 5.10, Android 13/14 variants of 5.15, Android 14/15 variants of 6.1, etc.) and then making many overlapping branches from those to stabilize them.
We're unconvinced that the Linux kernel is headed in the right direction. It's not truly getting more robust or secure. The accelerating complexity and churn is opposed to both, as are the culture and tools. We're hitting more issues including on our workstations and servers.
- Vanadium version 125.0.6422.72.1 releasedgithub.com Release 125.0.6422.72.1 · GrapheneOS/Vanadium
Changes in version 125.0.6422.72.1: fix regression breaking Chrome Custom Tab support when opening links in Incognito is enabled A full list of changes from the previous release (version 125.0.64...
Changes in version 125.0.6422.72.1:
- fix regression breaking Chrome Custom Tab support when opening links in Incognito is enabled
A full list of changes from the previous release (version 125.0.6422.72.0) is available through the Git commit log between the releases.
This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.