Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
1. All posts must be relevant to Android devices/operating system.
2. Posts cannot be illegal or NSFW material.
3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.
4. Non-whitelisted bots will be banned.
5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.
6. Memes are not allowed to be posts, but are allowed in the comments.
7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.
8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.
Community Resources:
We are Android girls*,
In our Lemmy.world.
The back is plastic,
It’s fantastic.
*Well, not just girls: people of all gender identities are welcomed here.
Our Partner Communities:
If someone gains access to your device they could alter or replace the OS without your notice, called an evil maid attack.
If the bootloader is locked, they’d have to have the phone OS booted and screen unlocked, then unlock the bootloader, which wipes the device.
If this is part of your threat model and you are using lineage on a device that supports
avb_custom_key
then you can sign it yourself before flashingThis is the way to go
People here are also missing one part of the android security model. Yes, you can overwrite the system partition arbitrarily while leaving the data partition intact with an unlocked bootloader, that’s how updates work.
However, the moment you make any changes to that system partition it won’t match the developers signature and the apps on the system will throw an absolute fit. Look into building your own lineage ROM and flashing it over an official build, it’s an entire process that requires your data partition to be unlocked (ie. phone booted and pin entered) to keep your data, even without making changes.
Realistically it isn’t insecure, if you set a passcode your data is encrypted and if someone mitm attacks your rom you will immediately notice stuff breaking all over the place.
The whole bootloader locking is purely vendors trying to force you to buy new phones every few years instead of the user backporting security patches indefinitely, not any practical security for the end user.
Couldn’t an attacker just make an OS image that tells the system to disregard any signature mismatch?
No, because that’s not how the matching works. Stuff in your data partition, as well as app data, is signed with those keys and hashed to the device. All of those bits do that hash on their own, and they all have to match up. When you change the main system partition then it’s signature has to match with the one generated when you set up your phone initially in the data partition.
Basically you have to have access to the data partition to disable the checks or change the signature, which needs your pin/passcode/fingerprint, and if you have that you don’t even need the phone, you dump the data partition and unlock it in an emulated android environment and exfiltrate data from there as if it was the original phone.
I also want to reiterate: A locked bootloader does not stop anyone from dumping your phone, emulating it, and brute forcing it, completely bypassing any rate-limiting on password attempts. By the time a bootloader lock even comes into play you can consider your phone completely compromised.
Malware could over write the bootloader allowing it to sit unnoticed forever.
Practically? Basically none at all.
If someone got physical access to your phone, they could install another OS without your knowledge.
Wouldn’t that wipe your device first with locked bootloader? You’d definitely notice.
Yeah, but if left unlocked then they could replace the OS or part of it without it being very obvious.
Not a thing most people just wanting better privacy need to worry about.
If I get hold of an unlocked Graphene phone, could I just flash stuff on it which is not properly signed by GOS?
Only if you unlocked the bootloader first which would wipe the device. Graphene relocks the bootloader after install.
Got confused about unlocked and thought you referred to unlocked lockscreen. Thanks.
unless someone gets physical access to your device there isn’t much to worry.
This is relatively minor. The bigger risk when running a downstream OS is that the team does not have the finances, the staff, or the broad-ecosystem visibility to support their own security research and development in any functional capacity, and there is an unavoidable delay in integrating security updates from the upstream OS.
This is a big problem. It makes running any small-team derivative OS a high-risk choice.
The last sentence doesn’t follow from everything before it. You could have said that it increases some risks, but decreases other risks. That would have been accurate.
And this is the point, right? Many people want to use alternative operating systems on their phones so that they aren’t vulnerable to Google itself. This itself is a massive reduction of a certain type of risk.
It depends on how you use your phone and what the physical attacker aims
My recommendations:
The way I understand it is the bootloader is built in security on the soc itself similar to tpm? In some regards phones are safer than computers in this way. If you leave your laptop out someone can tamper with the os, same with an unlocked bootloader. Safe from governments you shouldn’t use a phone if that’s your worry.
I don’t even have a lock on my phone
That’s ultimately for you to decide. No one here can tell you whether or not it’s likely that someone will gain unsupervised, physical access to your phone.
If you have to ask, then you aren’t important enough to actually be worrying about this kind of thing.
If you were that important, then you would already know the answer to your question.
If you were helpful, you’d answer the question
Instead you are actibg pretentious and unhelpful. Next time just don’t comment anything, downvote and leave :)
The question has already been answered. No point in me saying the same thing as others, but this question will always be asked regardless, so I pointed out the obvious thing people don’t like to accept: If you’re asking random internet strangers, then you’re not important enough to need this kind of security.
There’s pretty much no reason for the average Joe to worry about this kind of thing. If that was the case, they would already be acutely aware of the security risks imposed by unlocking the bootloader and installing a custom ROM. The biggest threat to mobile devices is physical access - but if someone has physical access to your device, all bets are off anyway.
I know it sounds rude, but there really isn’t any other way to explain this.
Its been a while since I used LineageOS on my OG Pixel (sailfish). I remember you have to install the custom bootloader like TWRP to flash the ROM and there was this thing with A and B partitions. Not sure if things change…
With an unlocked bootloader, whoever gets your phone can do the weird Vol Up + Power button combos to flash enter the TWRP bootloader. I couldnt recall correctly, but it is possible they can view / delete your data right within the TWRP screen. Not sure about transferring them off of your device.
OTOH, a locked bootloader wouldnt allow you to do this. There is no way to enter a flash a different ROM.
The thing with unlocked bootloader like LineageOS, especially in my case an OG Pixel, is that you can still flash the official Pixel OS in case Lineage starts to mess things up. LineageOS leaves the bootloader unlocked, so you can still flash.
I’m talking about the case where your phone is completely bricked, i.e. cannot open phone. So you can just use platform-tools to reflash. With Graphene, i guess it is more difficult in this case?
Custom recovery on bootloader-unlockable devices is required if you want to do everything on-device. You can still flash ROMs without a custom recovery. I don’t have a custom recovery on my P9PXL, but that’s only because there isn’t one…
Workarounds on locked devices usually install a custom recovery as part of that workaround. Last night, I installed LOS on one of my kids’ old Kindle Fire tablets. Amazon makes it really difficult, there’s a whole series of scripts and commands just to get TWRP installed. But once that’s done, you can load a ROM and flash it on-device.