As a project, GrapheneOS continues to grow with exceptionally loyal users, and it is easy to understand.

We are not some hobby or experimental OS. We are a work of (almost) 10 years of mobile and Android security research, with paid developers, members from many branches of computer and security expertise and volunteer moderators. Everything GrapheneOS has and will implement is added to target the current threat landscape, and is designed to combat real threats. Our security developments aren't to combat irrelevant, baseless 'what-if' scenarios or create easily attacked obscurity tactics and security theater features. We are not scammers who rely on telling you that you'll be "bulletproof" or "untraceable" unlike what came before GrapheneOS.

We are not some average AOSP distribution simply taking the Android base, piling other apps or flawed, insecure additions and treating them as our features. This is not innovation. GrapheneOS changes the AOSP base from all levels, hardening the most exploited components or replacing them with extra secure alternatives that we maintain or have even developed from the ground up. Projects like Hardened Malloc, Vanadium, Camera app and PDF viewer are some users will reap the benefits of in their day to day lives. Other OS's taking such work shows how valuable this work has been.

GrapheneOS is one of the only open-source projects to trailblaze mobile security, from implementing a lock screen bypass fix before Google, reporting numerous security vulnerabilities including ones used by companies attempting to attack us, and adding enhancements upstream to numerous open source projects. GrapheneOS is the first and still the only platform to have ARM hardware Memory Tagging Extensions implemented in production with the Pixel 8 and also the only browser in production when counting Vanadium as well. If you look at the project's socials for this, you will see additions like these have been planned years beforehand.

The foresight the project has for what we should implement should tell you what the experience and skills of the team members are. GrapheneOS is here to stay, and the work done will be around to stay even longer. Even if you don't use the OS you have reaped benefits of the work. It's never too late to understand what you are missing out.

#GrapheneOS

thinking about #grapheneos? good.

#cybersecgirl #privacytechpro #android

nostr:nevent1qqsxnklaw82v2g6c5r73zfhymd7825w8aw62d3fnp3fgyk2z4v6lk9cpp4mhxue69uhkummn9ekx7mqzyrq45kn9nph84dqnfhhr4wzj2nd9ch2tqnncknckeq5rwxfdx4gc2qcyqqqqqqgnaqqtj

Reply to this note

Please Login to reply.

Discussion

I switched a few years ago. Never looked back. Get a good pixel though. I cheaped out and regret that.

GrapheneOS is a perfect tool to fingerprint specific users.

Bear in mind that they encourage users to use their servers if you want to possess a working device for instance for having accurate clock, system and apps up to date.

For so many years they have not been able to create .onion version of their main site or download site to avoid direct connection or even via exit nodes. They don't have a possibility to update system via Tor.

Is it rocket science for experienced developers? NO, IT'S NOT.

You can assume that this is on purpose. They talk about privacy but they don't care about privacy and your personal security.

If you have doubts. Remember that CryptoAG fooled over 120 countries for dozens of years.

GOS encourages users to use so called sandboxed Google apps.

Keep in mind that even if you use them in separates profiles your phone with GrapheneOS shares the unique ID of your phone.

Using GrapheneOS you're a beacon for any actor who monitors internet traffic.

They'll do that then it'll be "but the fed run the tor nodes"

Most people use Graphene to limit reliance and exposure to big tech not because theyre Snowden.

If you use .onion address you don't use exit nodes. Your traffic is encrypted within Tor and doesn't leave Tor.

Big tech can track you as well even if you use 'sandboxed' services or different profiles. Your phone has unique ID.

What mobile OS do you use?

๐Ÿ’ฏ and even if they are. Snowden uses GrapheneOS. ignore the troll. another rotated npub, same old attack graphene and anyone who uses or recommends it time sink.

#m=image%2Fjpeg&dim=1440x1018&blurhash=r66a-dxu%25Mt6IB-%3BD%25t7R*%7EqRi-%3At7IU-%3BITt6Rk-%3BIU%25MxuM%7C-%3BM%7Bt6fRtRM%7Bt7ofRjxuRjofWBt7f6aeayWBWCfPj%5Bj%5BD%25j%5BRjRjj%5BM%7Bt7WBj%5B&x=d04b8882a04e7fe9c1c68b36dfd3b799f78e6427f251a23a516bed334de2566c

๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚

Sweetheart, ask him how he uses the phone๐Ÿ˜

https://iv.datura.network/watch?v=ucRWyGKBVzo

Yuo would be a good CryptoAG PR specialist, not manager of course.

"Crypto AG rejected these accusations as "pure invention", asserting in a press release that "in March 1994, the Swiss Federal Prosecutor's Office initiated a wide-ranging preliminary investigation against Crypto AG, which was completed in 1997. The accusations regarding influence by third parties or manipulations, which had been repeatedly raised in the media, proved to be without foundation.""

#m=image%2Fgif&dim=500x500&blurhash=UAIhEV%7EApd%5E*00IqRjIprV%25MI9IU.9jExux%5D&x=ac5464d69d5d90518eeda2127d5989953f4b17db91afc8de0f624885f24fce33

"I use GrapheneOS every day." - Edward Snowden (Nov 4, 2022)

#cybersecgirl #privacytechpro #grapheneos

#m=image%2Fjpeg&dim=1440x1018&blurhash=r66a-dxu%25Mt6IB-%3BD%25t7R*%7EqRi-%3At7IU-%3BITt6Rk-%3BIU%25MxuM%7C-%3BM%7Bt6fRtRM%7Bt7ofRjxuRjofWBt7f6aeayWBWCfPj%5Bj%5BD%25j%5BRjRjj%5BM%7Bt7WBj%5B&x=d04b8882a04e7fe9c1c68b36dfd3b799f78e6427f251a23a516bed334de2566c

nostr:nevent1qqsf7chefmgttattxdcahe30038qza62dguvm8ql3wal6sujeqezwmqpp4mhxue69uhkummn9ekx7mqzyp8t3qcs666wm9wx6e4rjkea8n64nwzl4my0w6ga4l2qt2fwq4wk6qcyqqqqqqg9kw7vh