#GrapheneOS version 2025020200 released.

This update adds support for sandboxed Google credential services. Some bug fixes.

• reimplement our fix for an upstream audio routing regression in Android 15 QPR1 impacting sandboxed Android Auto and likely other apps to avoid blocking another subset of apps from changing audio routing when granted permission

• Sandboxed Google Play compatibility layer: add support for enabling Google's credential service via Settings > Passwords, passkeys & accounts by making it function as an unprivileged service (non-Chromium-based apps tend to require this to use Google as the passkey service and it's needed by certain apps for their Sign in with Google option despite Android intending to fully support other credential services)

• Sandboxed Google Play compatibility layer: allow disabling all Play Integrity API notifications instead of only disabling them per-app

• Sandboxed Google Play compatibility layer: override Play services update owner value to the GrapheneOS App Store to fully handle updates for it ourselves

• work around upstream Android issue caused by an optimization which was adding a 10 second delay to certain setting changes before they kick in for background system packages

• kernel (5.15): update to latest GKI LTS branch revision

• kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.126

• kernel (6.1): drop revert for upstream USB fix to test if it's still needed due to lots of other backported changes

• kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.74

• Vanadium: update to version 133.0.6943.39.0

• Vanadium: update to version 133.0.6943.39.1

• remove same version ABI stability check not useful for GrapheneOS

https://grapheneos.org/releases#2025020200

Reply to this note

Please Login to reply.

Discussion

feature ask: ability to disable mobile data (vs WiFi & VPN) on per app basis like LineageOS.

I understand this may be a lot of work due the benefits of GrapheneOS networking stack

We haven't added these because they have issues with leaks. It doesn't block an app trying to do internet access through an indirect method

well, we don't want leaks. Feature would need to be implemented properly, and I understand that's a big enhancement