• 12 Posts
  • 184 Comments
Joined 3Y ago
cake
Cake day: Mar 21, 2022

help-circle
rss

Its better than crypto or corpo-crypto (“wireless transfer”)


Just smell on it and the cocaine goes into your blood





There are things. Keep an Eye on the GrapheneOS Camera (available through their appstore). For purely Text OCR there are also some PDF scanner apps.


Thanks, remembered that too. Displaylink sucks, so I guess no.


Yup, an issue on the GrapheneOS issue tracker was closed, to implement this feature. Maybe giving it another try might help? Its damn useful and smart, as this has no function


Yes the buttons and the “long press power button on display off for flashlight” both small but soo useful things



No there is nothing FOSS. Everything there is is proprietary. Even though Tesseract OCR is FOSS.

You can use Google Camera and Google Lens on GrapheneOS I think. Google Lens may need play services.


Native android (AOSP) photo picker portal, really great. If you want to use a different gallery chooser, click on the right upper button.

This means apps dont need full access to your stuff.

Looking at you, Signal, Whatsapp, or all the other apps implementing internal galleries for no reason.


No thats on Android for ages.


True, I went through a project once and it can be scary what EOL libraries and components it needs. But stripping out stuff was not needed.


Echo is the “you listened x hours to y” I think.

I dont think thats needed, but all the updates to the codebase are totally.


Yeah dont know either why a fork is needed. It is a port to various modern Android standards and libraries, so it is absolutely needed and not necessarily a deviation.

I think the changes are okay, but not needed.


Thought about checking if I already did that? …


I dont think it is very debloated, but look at the repo, home and echo page are removed and there are no modules anymore.




Podcini is really great! It modernizes the Antennapod codebase (we wouldnt believe but that is pretty outdated!) and makes it more efficient. > Differing from the forked project, this project is purely Kotlin based, relies on the most recent dependencies, and most importantly has migrated the media player to androidx.media3, and added mechanism of AudioOffloadMode which is supposed to be kind to device battery. Efficiencies are also sought on running the app. App build is also upgraded to target Android 14. After some hiccups at the beginning, it is now in a very good state!
fedilink

My 6a is not sluggish on GrapheneOS. Maybe it is not an additional feature but the solution.

Are they using GrapheneOS?


A used Pixel should tick all the boxes, plus it supports GrapheneOS.

No idea when they started to implant displays with such insanely high refresh rate (I cant see that) but the 8 may already be available?

I got a 6a for 160€.


Yes you need to register a new device on the website and it works, never did it but a friend of mine


I highly recommend switching to GrapheneOS, it is very easy to install, even from another phone completely GUI.

apart from that, disable all google crap you dont need including gmail, and it will not show anymore and block that place.

You could maybe also disable “open links” in gmail app settings (long press on icon, app info) but I think this doesnt work


Interesting, yes thats pretty cheap and fits! Didnt know that there is a difference, probably “business” or “consumer” marketing


Hardware: compact affordable USB-C dock
I am thinking about using my GrapheneOS Pixel6a as a desktop. Not really tbh, but in emergencies and if Collabora Office etc work well, why not? I would like to experiment. What I need: - USB-A mouse - USB-A keyboard - USB-A thumbdrive (at least one) - HDMI/DP monitor port (I use VGA but with an HDMI adapter) - maybe AUX So nothing fancy, but it should not cost damn 100€ or be cheap chinesium. I am from the EU, which is really important too, so no Walmart or Target or whatever (the electronic shops we have are horrible). Thanks! --- It seems like a "USB hub" is what I am looking for. Matching manifacturers: - Anker - ...
fedilink

F-Droid: use F-Droid Basic instead. You may want to use obtainium but tbh its a total pain.

Also note the list of external f-droid repos

Aurorastore: use only session installer, dont grant access to all storage (only needed for /obb access)

Antennapod: podcini may become a better fork, more efficient and modern.


Lol, FCM sends the CONTENT of messages through Google?? Wtf why do we even have “E2EE” Whatsapp then?


Lol thats on AOSP too. Locked for some reason, I guess I need to do the

  1. Disable energy saver
  2. Disable “dark mode on energysaver”
  3. Enable energy saver again

App that adds a quicksettings toggle to switch between light/dark theme?
Okay this is an AOSP feature, see first comment The problem is that Google decided to do stupid stuff without user consent again - dark mode can't be turned off on energysaver (which doesnt make any sense non non-OLED displays which are still common) - energysaver reduces possible max brightness without any reason, not even changeable like in older Androids (where the bar actually went down) Fuck Google...
fedilink

/e/OS is extremely insecure.

Iodé is just LineageOS which is also not better

Purism (librem) is a scam company not delivering any phones to paying customers, while pretending to do well.

GrapheneOS is the only one that makes sense, and they use it as Base, so if you for some reason dont want GrapheneOS this may be the next best thing


It is based on GrapheneOS which is exactly what the project wants.

GrapheneOS is permissively licensed which means exactly this is possible and wanted. I dont get it, but I guess its realism.

Their hardware is way less secure though, so I will stick with user Pixels and GrapheneOS.


Yeah it should be sandboxed Play if they dont totally mess up


Aaah that Apostrophy OS thing.

Sooo: their phone is way less secure than a Google Pixel, their OS is paid but possibly less secure than GrapheneOS as they need to remove features like Memory Tagging that is only available on Pixels.

Hell I dont even know if they have a secure element.

Until we get Sourcecode I wouldnt trust them.


Thanks! Yeah that is a service running entirely on their site, so permissionwise very good but they get your stuff. There are lots of browser tools running locally using javascript, and images never leave the browser.


Portal in, transform, portal out. Have a look at ZiXTract, it works.


A good Collage app?
I am looking for an app that allows me to combine up to 20 images into a grid. That's it. Hard requirements: - not bigger than 60MB (not bloated with useless stickers etc.) - works properly, multiple grids, maybe adaptive to content, rectangle, resizable images inside the grid. Soft requirements: - no ads or creepy network stuff (GrapheneOS network toggle deals with that) - latest target SDK - support for share dialog OR android photo picker portal (instead of using their own filepicker and needing storage access) - FOSS So far I tried these apps, all garbage: - Layout for Instagram (outdated) - [Collagemaker](https://play.google.com/store/apps/details?id=photoeditor.layout.collagemaker) which is the same as [This Collagemaker](https://play.google.com/store/apps/details?id=photocollage.photoeditor.collagemaker) - beFunky: share dialog broken - [Jubo Photo Collage maker](https://play.google.com/store/apps/details?id=com.qixinginc.aiimg) All have their own silly galleries and have a nonfunctional share portal. Explanation: Apps dont need access to your storage to load content into their internal sandbox storage. They can use the native android photo picker portal: GIF (click if not playing) ![gif](https://developer.android.com/static/images/training/data-storage/photo-picker-multiselect.gif) Or they can catch media sent to them via the share dialog, from your trusted Gallery or Filemanager app. ![image](https://developer.android.com/static/images/training/sharing/sharesheet_custom_actions.png) Apps using a builtin Gallery suck, as they need access to all media (Android 14), specific folders (GrapheneOS) or even all storage (older Android) which is pretty invasive. And yeah, Signal is still doing that.
fedilink


The correct way is work profile with separate unlock, use Shelter or Insular to activate and manage the profile, both apps are FOSS.

The other way is user profiles, GrapheneOS improves the UX of them a lot, stock Android is not really usable without reboots.



Deku SMS is the best alternative, supports AES encrypted SMS between users of the same app


Thats a fair point. But the real and simple problem is “your phone number was breached somewhere, change it”. I never get spam calls or mails, people that are not careful do.


Sounds like an overcomplex and invasive solution for an easy problem. Just switch the number, obviously some strange people (and a lot) had access to it.

Then follow with best practices and never give out your phone number when possible. There are tons of free sms services you can use


App to overlay black with varying transparency? (make display darker)
Hey, my Pixel with GrapheneOS doesnt get dark enough. Android has some "extradark" feature that basically overlays black with a set transparency. I used Red Moon in the past but its overcomplex, I have Android bluelight filter which works fine, and just would like an app to overlay such a dark mode. The screen is OLED so I think? It even saves energy?
fedilink

Building a PC with laptop components?
Hey, I have never built a PC myself. ::: spoiler random anecdotal history of my computer use I had one back then, Windows 7 and Minecraft as far as I know, pretty bad, solved through Optifine (the typical "double your Minecraft performance" trick, to this day, wtf Microsoft). Then I got a Thinkpad T430 and did some hardware "hacking", custom EC firmware (and then a modded AX200 Wifi card and Greencell battery), custom BIOS, tried a quad core i7 CPU which was an overheating and batterydraining mess. Then a weird "in between" Thinkpad T495 which ½ sucks (horrible firmware, very bad CPU, bad screen), ½ rocks (fprint support, best keyboard in history). ::: Now a friend of mine does more GPU intense stuff, mainly static Adobe design thingd, already tweaked and debloated Windows 10 but the laptop sucks extremely. They think about getting a PC and I suppose hunting for parts could make sense? I would want to get a modern motherboard which good performance, 32GB RAM max, reasonable GPU. And I have an AX200 (pcie) wifi card, which is the weird thing that brought me to this question: can I use that on a PC mobo, or is there a problem? What "laptop parts" (i7 intel cpu but laptop model, GPU, LP-DDRx RAM,...) make sense in a PC? Is a Mx mac the best option if you want Adobe stuff? I never used Apple stuff and I fear that ecosystem, but Windows is total cancer and Mac is at least kinda Unix based, so I imagine it must be way better than Windows, and the hardware is currently so much better.
fedilink


RutheniumOS is a fork of GrapheneOS with very broad claims and also accusations toward GrapheneOS. They throw around claims that are not true, which is a common (Brax, Punkt) but ugly practice. Dont use it Guys!
fedilink


GrapheneOS has really good documentation, I highly recommend you to read it! I will not cite their website as the content may change.
fedilink

Why does GrapheneOS not run on the Fairphone 4?
As Reddit is a walled garden now, I want to repost Daniel Micays answer why GrapheneOS is not supporting this "suitable device". --- ::: spoiler english original > Fairphone 4 doesn't provide proper privacy/security patches, which is the most bare minimum requirement for a device. > https://support.fairphone.com/hc/en-us/articles/4405858220945-FP4-Fairphone-OS-Release-Notes > They released the November 2022 security patch meant to be published on November 7th on December 19th instead. Bear in mind they receive early access to these security patches not available to GrapheneOS. > Please note that the monthly security patches described on that patch are only a subset of the Android security patches. Android divides up the security patches into the mandatory patches listed in the Android Security Bulletin and recommended patches listed in the Pixel Update Bulletin. The latest monthly, quarterly or yearly Android release contains the recommended patches. The mandatory patches are backported to the older releases. > As an example, this is the mandatory subset of the December security patch not shipped for the Fairphone 4: > https://source.android.com/docs/security/bulletin/2022-12-01 > Most of the 2022-12-05 patches require the vendor to release an update. > This is the Pixel Update Bulletin for December 2022: > https://source.android.com/docs/security/bulletin/pixel/2022-12-01 > The first sections not marked as Pixel are recommended patches for other devices. The section marked as Pixel are largely applicable to other devices with either a Snapdragon SoC, Exynos SoC or a separate Qualcomm/Samsung cellular modem. The Pixel Update Bulletins provide a lot more patches than what other vendors are required to fix to claim the latest patch level. This means the patch level elsewhere doesn't mean as much as you think, and it means almost nothing on alternate operating systems setting it incorrectly. > > As far as I can tell, the fairphone 4 does have a secure element. The Qualcomm SM7225 chip the phone uses lists that it has a "trusted execution environment", "platform security foundations", "secure processing unit" and "type-1 hypervisor", these are slightly different terminology, but appear to be all the things graphene are always saying would be needed. > TrustZone, virtualization that's not usable by us (we can use the virtualization support on the Pixel 6 and later, but not Snapdragon support since that's for Qualcomm and must be licensed by an OEM for their particular usage) along with marketing buzzwords are not a secure element. Qualcomm SPU is a secure element, but does not implement the required functionality. The functionality implemented by the TEE (TrustZone, not a secure element) and SPU depend on the OEM. Fairphone hasn't filled in the functionality that's expected. Qualcomm doesn't provide it out-of-the-box. > > I had a quick look at qualcomm's exploit disclosures for the SOC, and admittedly there are a lot, but all I could find were firmware exploits that have presumably been patched. I couldn't find anything related to fundamental problems with the underlying hardware that would make it insecure. Would you mind linking to whatever active hardware exploits in the Qualcomm SM7225 chip you know of? > Qualcomm and Android security bulletins are published monthly. There are usually firmware security patches every month. There are also usually patches to Qualcomm's proprietary libraries. On the Fairphone 4, all the userspace SoC support would be for Android 11, and while still usable for Android 13 not at all ideal and with major caveats. > > The update schedule of the fairphone shouldn't matter for discussions about potential for graphene given that all the software would be replaced anyway, besides perhaps the firmware, but if the patches are available it should be easy to apply them from the upstream with OS support. I haven't seen any evidence of fairphone 4 shipping security critical firmware updates late btw, but I'm not going to contest it since it would be irrelevant anyway. > That's not at all correct. The firmware would come from them which is a substantial portion of the security patches and no less important. The software would largely come from them too whether the components are open or closed source. > The evidence of them shipping security patches late is right there on their site. They ship each monthly Android security patch significantly late, and those are just the mandatory Android security patches, not the recommended patches. The Android security patches are just a baseline and often include upstream fixes months late or longer. Shipping these on time is a low bar, not a high bar, especially if a vendor is only shipping the mandatory ones and not all recommended patches. Fairphone is missing literally years of recommended patches due to being based on Android 11. This does matter when using another OS because you are still going to be using their vendor code, via Treble. Since their vendor code isn't updated to Android 13 QPR1, the most straightforward way to support it is via Treble, meaning the vendor portion of userspace will not have recommended patches and hardening beyond Android 11. On Pixels, we can built a lot of vendor ourselves since it matches the OS version, and we can freely replace components case-by-case. > > I can't find any sources for exploit disclosures surrounding fairphone's secure boot implementation. It's possible you're referring to the general misnomer that "devices other than pixels don't support relocking the bootloader", if so then it should be pointed out that fairphone 4 does. If there's something else specific please link the CVE. > Their verified boot implementation is incomplete and broken. This has been confirmed by us and multiple independent search researchers. This has to work in order for it to be relevant. It's also missing features. Most vulnerabilities don't get a CVE assigned, that's simply not how the real world works. > > Not trying to shill for fairphone or anything, I can't even buy their products in my country, and I only did like 5 minutes of research, but it seems like a perfectly valid candidate to me. > It is not a valid candidate, and as you said you only did 5 minutes of research. You had an answer you wanted and you looked for bits of information to try to confirm what you wanted to see. > This phone doesn't come close to meeting our requirements. The SoC is also old and has already gone through a lot of Qualcomm's 4 year guaranteed support for the SoC. Compare it to the recently launched Pixel 6a with 5 years of support guarantee from launch. That also means something much different for the Pixel 6a, which receives every monthly security patch on time. It also receives every monthly, quarterly and yearly release of AOSP on time which bring the recommended privacy/security patches and other improvements. We need this software support. We could make some sacrifices but not shipping even the mandatory ASB patches almost 2 months late every month. > Giving people something branded as GrapheneOS but which doesn't come close to providing the basics that are expected goes against what we believe in doing. We cannot support this device and call it GrapheneOS. ::: ::: spoiler deutsche Übersetzung > Das Fairphone 4 bietet keine geeigneten Datenschutz-/Sicherheitspatches, was die absolute Mindestanforderung für ein Gerät darstellt. > https://support.fairphone.com/hc/en-us/articles/4405858220945-FP4-Fairphone-OS-Release-Notes > Stattdessen wurde der Sicherheitspatch vom November 2022, der am 7. November veröffentlicht werden sollte, am 19. Dezember veröffentlicht. Bedenken Sie, dass sie frühzeitig Zugriff auf diese Sicherheitspatches erhalten, die für GrapheneOS nicht verfügbar sind. > Bitte beachten Sie, dass die in diesem Patch beschriebenen monatlichen Sicherheitspatches nur eine Teilmenge der Android-Sicherheitspatches sind. Android unterteilt die Sicherheitspatches in die im Android Security Bulletin aufgeführten obligatorischen Patches und die im Pixel Update Bulletin aufgeführten empfohlenen Patches. Die neueste monatliche, vierteljährliche oder jährliche Android-Version enthält die empfohlenen Patches. Die obligatorischen Patches werden auf die älteren Versionen zurückportiert. > Dies ist beispielsweise die obligatorische Teilmenge des Dezember-Sicherheitspatches, der nicht für das Fairphone 4 ausgeliefert wurde: > https://source.android.com/docs/security/bulletin/2022-12-01 > Die meisten Patches vom 05.12.2022 erfordern die Veröffentlichung eines Updates durch den Anbieter. > Dies ist das Pixel-Update-Bulletin für Dezember 2022: > https://source.android.com/docs/security/bulletin/pixel/2022-12-01 > Die ersten Abschnitte, die nicht als Pixel gekennzeichnet sind, sind empfohlene Patches für andere Geräte. Der als Pixel gekennzeichnete Abschnitt gilt weitgehend für andere Geräte mit einem Snapdragon-SoC, Exynos-SoC oder einem separaten Qualcomm/Samsung-Mobilfunkmodem. Die Pixel-Update-Bulletins stellen viel mehr Patches bereit, als andere Anbieter reparieren müssen, um die neueste Patch-Stufe zu erhalten. Das bedeutet, dass der Patch-Level anderswo nicht so viel bedeutet, wie Sie denken, und dass er bei alternativen Betriebssystemen fast nichts bedeutet, wenn er falsch eingestellt wird. > > Soweit ich das beurteilen kann, verfügt das Fairphone 4 über ein sicheres Element. Der Qualcomm SM7225-Chip, den das Telefon verwendet, gibt an, dass es über eine „vertrauenswürdige Ausführungsumgebung“, „Plattformsicherheitsgrundlagen“, „sichere Verarbeitungseinheit“ und „Typ-1-Hypervisor“ verfügt. Dies sind leicht unterschiedliche Terminologien, scheinen aber alles zu sein Graphen wird immer benötigt. > TrustZone, Virtualisierung, die von uns nicht genutzt werden kann (wir können die Virtualisierungsunterstützung auf dem Pixel 6 und höher nutzen, aber nicht die Snapdragon-Unterstützung, da diese für Qualcomm ist und von einem OEM für ihre jeweilige Verwendung lizenziert werden muss) sowie Marketing-Schlagworte sind nicht sicher Element. Qualcomm SPU ist ein sicheres Element, implementiert jedoch nicht die erforderliche Funktionalität. Die von TEE (TrustZone, kein sicheres Element) und SPU implementierte Funktionalität hängt vom OEM ab. Fairphone bietet nicht die erwartete Funktionalität. Qualcomm bietet es nicht sofort an. > > Ich habe einen kurzen Blick auf die Exploit-Offenlegungen von Qualcomm für das SOC geworfen, und zugegebenermaßen gibt es viele, aber alles, was ich finden konnte, waren Firmware-Exploits, die vermutlich gepatcht wurden. Ich konnte nichts im Zusammenhang mit grundlegenden Problemen mit der zugrunde liegenden Hardware finden, die sie unsicher machen würden. Würde es Ihnen etwas ausmachen, auf alle Ihnen bekannten aktiven Hardware-Exploits im Qualcomm SM7225-Chip zu verlinken? > Qualcomm- und Android-Sicherheitsbulletins werden monatlich veröffentlicht. Normalerweise gibt es jeden Monat Firmware-Sicherheitspatches. In der Regel gibt es auch Patches für die proprietären Bibliotheken von Qualcomm. Auf dem Fairphone 4 würde die gesamte Userspace-SoC-Unterstützung für Android 11 gelten, und obwohl sie für Android 13 noch nutzbar ist, ist sie überhaupt nicht ideal und mit großen Einschränkungen. > > Der Update-Zeitplan des Fairphone sollte für Diskussionen über das Potenzial von Graphen keine Rolle spielen, da sowieso die gesamte Software ersetzt würde, außer vielleicht der Firmware, aber wenn die Patches verfügbar sind, sollte es einfach sein, sie vom Upstream mit Betriebssystemunterstützung anzuwenden . Ich habe übrigens keine Beweise dafür gesehen, dass das Fairphone 4 spätestens sicherheitskritische Firmware-Updates ausgeliefert hat, aber ich werde es nicht bestreiten, da es sowieso irrelevant wäre. > Das ist überhaupt nicht richtig. Von ihnen würde die Firmware stammen, die einen wesentlichen Teil der Sicherheitspatches ausmacht und nicht weniger wichtig ist. Auch die Software würde größtenteils von ihnen stammen, unabhängig davon, ob es sich bei den Komponenten um Open-Source- oder Closed-Source-Komponenten handelt. > Der Beweis dafür, dass sie Sicherheitspatches verspätet versendet haben, finden Sie direkt auf ihrer Website. Sie versenden jeden monatlichen Android-Sicherheitspatch mit erheblicher Verspätung, und dabei handelt es sich nur um die obligatorischen Android-Sicherheitspatches, nicht um die empfohlenen Patches. Bei den Android-Sicherheitspatches handelt es sich lediglich um eine Baseline und sie enthalten oft Monate später oder länger Upstream-Korrekturen. Die rechtzeitige Lieferung dieser Patches ist eine niedrige und keine hohe Hürde, insbesondere wenn ein Anbieter nur die obligatorischen Patches und nicht alle empfohlenen Patches liefert. Fairphone fehlt buchstäblich jahrelang an empfohlenen Patches, da es auf Android 11 basiert. Dies ist jedoch wichtig, wenn Sie ein anderes Betriebssystem verwenden, da Sie über Treble weiterhin den Code des Herstellers verwenden. Da der Code ihres Anbieters nicht auf Android 13 QPR1 aktualisiert ist, ist die einfachste Möglichkeit zur Unterstützung die Verwendung von Treble. Dies bedeutet, dass der Anbieterteil des Benutzerbereichs über Android 11 hinaus keine empfohlenen Patches und Härtungen aufweist. Auf Pixeln können wir viele davon erstellen Wir liefern den Hersteller selbst, da er mit der Betriebssystemversion übereinstimmt, und wir können Komponenten von Fall zu Fall frei austauschen. > > Ich kann keine Quellen für Exploit-Offenlegungen im Zusammenhang mit der sicheren Boot-Implementierung von Fairphone finden. Möglicherweise beziehen Sie sich auf die allgemeine Fehlbezeichnung, dass „andere Geräte als Pixel das erneute Sperren des Bootloaders nicht unterstützen“. Wenn dies der Fall ist, sollte darauf hingewiesen werden, dass Fairphone 4 dies tut. Wenn es noch etwas Spezifisches gibt, verlinken Sie bitte das CVE. > Ihre verifizierte Boot-Implementierung ist unvollständig und fehlerhaft. Dies wurde von uns und mehreren unabhängigen Suchforschern bestätigt. Das muss funktionieren, damit es relevant ist. Es fehlen auch Funktionen. Den meisten Schwachstellen wird kein CVE zugewiesen, so funktioniert die reale Welt einfach nicht. > > Ich versuche nicht, für Fairphone oder so etwas zu werben, ich kann deren Produkte in meinem Land nicht einmal kaufen und ich habe nur 5 Minuten recherchiert, aber es scheint mir ein absolut gültiger Kandidat zu sein. > Es handelt sich nicht um einen gültigen Kandidaten, und wie Sie sagten, haben Sie nur 5 Minuten recherchiert. Sie hatten eine Antwort, die Sie wollten, und suchten nach Informationen, um zu bestätigen, was Sie sehen wollten. > Dieses Telefon entspricht nicht annähernd unseren Anforderungen. Auch der SoC ist alt und hat bereits einen Großteil des 4-Jahres-Garantie-Supports von Qualcomm für den SoC durchlaufen. Vergleichen Sie es mit dem kürzlich eingeführten Pixel 6a mit 5 Jahren Support-Garantie ab Markteinführung. Das bedeutet auch etwas ganz anderes für das Pixel 6a, das jeden monatlichen Sicherheitspatch pünktlich erhält. Außerdem erhält es pünktlich jede monatliche, vierteljährliche und jährliche Veröffentlichung von AOSP, die die empfohlenen Datenschutz-/Sicherheitspatches und andere Verbesserungen enthält. Wir brauchen diese Softwareunterstützung. Wir könnten einige Abstriche machen, würden aber nicht einmal die obligatorischen ASB-Patches jeden Monat fast zwei Monate zu spät versenden. > Den Menschen etwas zu geben, das als GrapheneOS bezeichnet wird, das aber nicht annähernd die erwarteten Grundlagen bietet, widerspricht unseren Vorstellungen. Wir können dieses Gerät nicht unterstützen und es GrapheneOS nennen. :::
fedilink