The post comes from the CEO of https://myntex.com, a company selling problematic proprietary phones and messaging services (https://chatmailsecure.com). You can see why a company like this would feel threatened by open source projects like GrapheneOS, Signal, Matrix and others.
The post comes from the CEO of https://myntex.com, a company selling problematic proprietary phones and messaging services (https://chatmailsecure.com). You can see why a company like this would feel threatened by open source projects like GrapheneO…
Article finishes up with baseless, unsubstantiated claims that we made false accusations about the source of the DDoS. You can see our thread and replies where we talked about why the attacks are unsurprising and gave examples of other ongoing underhanded attacks on our project.
Article finishes up with baseless, unsubstantiated claims that we made false accusations about the source of the DDoS. You can see our thread and replies where we talked about why the attacks are unsurprising and gave examples of other ongoing under…
Conflating the 2 minute DDoS attack on our website this month with overall Matrix ecosystem DDoS attacks last year and news about Cloudflare and OVH doesn't make much sense. They try to portray the DDoS attacks and our transparency about them as somehow eroding our reputation.
Conflating the 2 minute DDoS attack on our website this month with overall Matrix ecosystem DDoS attacks last year and news about Cloudflare and OVH doesn't make much sense. They try to portray the DDoS attacks and our transparency about them as som…
They try to portray the fact that GrapheneOS is an open source project funded by a substantial amount of donations rather than a business model as a negative, and try to imply that creates 'security deficits'. This is typical behavior from a typical…
They try to portray the fact that GrapheneOS is an open source project funded by a substantial amount of donations rather than a business model as a negative, and try to imply that creates 'security deficits'. This is typical behavior from a typical security industry charlatan.
In this post, they conflate the recent DDoS attack on our website servers (only static content) with previous unrelated attacks targeting the federated Matrix chat ecosystem as a whole. They make many unsubstantiated and outright false claims in an …
A group selling highly problematic proprietary phones and chat services which they claim to be secure has tried to use this short 2 minute DDoS incident to attack the project with blatant spin and fabrications:https://medium.com/@Geoff_Green/multipl…
We made it clear we don't know the specific group behind that specific DDoS attack. In response to https://twitter.com/kitfunfel/status/1623632234971545600, we explained it's not a sophisticated attack and very likely originates from groups who open…
Earlier this month, unknown attackers targeted our website servers by spamming requests in an attempt to overload the servers and prevent users from accessing out website. We provided detailed information on what was happening and how we responded t…
GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 35 released: https://github.com/GrapheneOS/platform_packages_apps_GmsCompat/releases/tag/config-35.See the linked release notes for a summary of the improvements over …
GrapheneOS now has an improved implementation of our HTTPS-based network time implementation providing far better precision/accuracy than the insecure network time (NTP without NTS) used by Android. More information available in our latest release n…
GrapheneOS version 2023022300 released: https://grapheneos.org/releases#2023022300.See the linked release notes for a summary of the improvements over the previous release.Forum discussion thread:https://discuss.grapheneos.org/d/3524-grapheneos-vers…
Vanadium version 110.0.5481.154 released: https://github.com/GrapheneOS/Vanadium/releases/tag/110.0.5481.154.See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.Forum discussion t…
Our network services including connectivity checks, network time, PSDS cache, hardware-backed attestation key provision proxy and the in-progress SUPL proxy are provided via an nginx configuration available at https://github.com/GrapheneOS/grapheneo…
Our servers including the 3 providing network services obtain time via secure NTP with NTS using chrony without trusting any single upstream time server:https://github.com/GrapheneOS/infrastructure/blob/main/chrony.confHTTPS-based approach in the OS…
There's also an around 10x reduction in request time from establishing the HTTPS connection in advance due to TCP/TLSv1.3 initialization overhead.We have 3 locations (Quebec, France, Singapore) for our basic network services and our self-hosted GeoD…
We've made significant improvements to our HTTPS-based network time update system for our next OS release.https://github.com/GrapheneOS/platform_frameworks_base/commit/b0407ee4a553784a8b6af6e191f886eb021289ceShould provide most users with around 3 t…