Avatar
Mabardino πŸ€
ee772a9ec50f3c664ce3583a23d7f9e036d4e353f11a94b2d11113165d3dced8
Studied Laurea in architettura at UniversitΓ  degli Studi di Firenze

i dreamt that damus android released and that's all I remember from last night but fr I was so excited and scrolling thru my feed over and over again big testingπŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚ nostr:npub1xtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsevkk5s

Here are some further clarifications regarding the hardening and future anti-exploitation techniques from the team at #GrapheneOS:

Source: https://nitter.cz/GrapheneOS/status/1751097979866624501

"Our latest release provides another enhancement for our protection against firmware-based attacks on devices by forensics companies. We're going to be doing more similar work.

GrapheneOS has zero-on-free for the main allocator used by native code (malloc) along with the kernel page allocator and slab allocator. In particular, zeroing data in the kernel page allocator heavily limits the lifetime of data and clean reboots clear most of the OS memory.

We believe that our zero-on-free features are why forensics companies are announcing support for obtaining data in After First Unlock state for the stock OS via firmware exploits while seemingly not being able to target GrapheneOS yet, but we're rolling our more improvements.

In an earlier release this month, we replaced our auto-reboot feature with a new implementation in the init process to prevent a potential bypass through crashing core system processes. We also made it stop chain in Before First Unlock state to make low timers much more usable.

The default auto-reboot timer was reduced from our initial choice of 72 hours to 18 hours.

GrapheneOS has provided a feature for disabling USB peripherals for years. By default, we disable USB peripherals while locked. USB is very complex and has other uses than this though.

Fast charging and the low-level protocol for USB-C are extremely complex. These are largely implemented by Linux kernel drivers and the core kernel USB support along with another implementation in the non-OS firmware boot modes, not the isolated USB controller hardware/firmware. Android 12 added a device administration setting to supposedly disable USB data and a low level USB Hardware Abstraction Layer (HAL) implementation to go along with it. This does not really work as you would expect and only disables high level USB functionality like peripherals.

It also disables USB gadget support, which is already disabled by default other than device advertising itself as supporting MTP to be detected by computers by default without having MTP enabled until the user enables it. We investigated it near 12 launch but found it lacking. USB gadget support is how MTP/PTP, MIDI, tethering (Ethernet), Android 14 QPR1 webcam support and the developer options Android Debug Bridge function. By default, Android uses MTP mode with MTP disabled until user unlocks and enables it. This adds no significant attack surface.

Attack surface for low-level USB-C and charging is massive. Vulnerabilities being leveraged by forensics companies are often USB bugs. Working reset attack mitigation is barely deployed by devices meaning they can target firmware USB while device is booted into a special mode.

We proposed improvements for Pixels in Android security bug reports we filed recently. They're already working on it and we expect it will be shipped in a few months, ending the ability to get data from After First Unlock mode via special firmware modes, but not the OS itself.

To better protect the OS itself, we're working on a much lower level implementation of disabling USB support by implementing it in platform-specific drivers much lower level than the generic Linux kernel code. This will have some usability impact so it has to be a separate mode. We've also discussed the possibility of offering a toggle for disabling fast charging while locked or as a whole for further attack surface reduction. This would certainly not be enabled by default and our focus is on the always enabled or at least default enabled protections.

Our existing default-enabled USB protection disables adding new peripherals while locked. Peripherals you add while unlocked work after locking. Android's standard USB gadget control is based around approval while unlocked, which is similar. We just need to make this lower level."

thanks for your consistent updates :)

hahahaha I was such a dumb 17 year old πŸ’€ actually crazy this was over 4 years ago now

yeh 100%, I found the project that rugpulled me just now actually πŸ˜‚πŸ˜‚πŸ˜‚

feel free to have a laugh:

https://www.alienenemes.io/

I see, so it's not possible?

nostr:npub1mutnyacc9uc4t5mmxvpprwsauj5p2qxq95v4a9j0jxl8wnkfvuyque23vg is it a lot of effort to add a biometric lock option for the android app? how many sats would it take to implement πŸ˜‚, I would really like that feature

anyone know how I can put my electrum server on clearnet? it's on an umbrel device, I'm using a cloud flare worker to explore my mempool instance on clearnet but for some reason the same approach doesn't work for the electrum server

so happy I don't have to deal w this shit where I liveπŸ˜‚πŸ˜‚πŸ˜‚πŸ˜‚

nostr:npub1mutnyacc9uc4t5mmxvpprwsauj5p2qxq95v4a9j0jxl8wnkfvuyque23vg is the best lightning wallet hands down, buying the dip and withdrawing with lightning easy peasy to mutiny

this include profile pictures?

As a project, GrapheneOS continues to grow with exceptionally loyal users, and it is easy to understand.

We are not some hobby or experimental OS. We are a work of (almost) 10 years of mobile and Android security research, with paid developers, members from many branches of computer and security expertise and volunteer moderators. Everything GrapheneOS has and will implement is added to target the current threat landscape, and is designed to combat real threats. Our security developments aren't to combat irrelevant, baseless 'what-if' scenarios or create easily attacked obscurity tactics and security theater features. We are not scammers who rely on telling you that you'll be "bulletproof" or "untraceable" unlike what came before GrapheneOS.

We are not some average AOSP distribution simply taking the Android base, piling other apps or flawed, insecure additions and treating them as our features. This is not innovation. GrapheneOS changes the AOSP base from all levels, hardening the most exploited components or replacing them with extra secure alternatives that we maintain or have even developed from the ground up. Projects like Hardened Malloc, Vanadium, Camera app and PDF viewer are some users will reap the benefits of in their day to day lives. Other OS's taking such work shows how valuable this work has been.

GrapheneOS is one of the only open-source projects to trailblaze mobile security, from implementing a lock screen bypass fix before Google, reporting numerous security vulnerabilities including ones used by companies attempting to attack us, and adding enhancements upstream to numerous open source projects. GrapheneOS is the first and still the only platform to have ARM hardware Memory Tagging Extensions implemented in production with the Pixel 8 and also the only browser in production when counting Vanadium as well. If you look at the project's socials for this, you will see additions like these have been planned years beforehand.

The foresight the project has for what we should implement should tell you what the experience and skills of the team members are. GrapheneOS is here to stay, and the work done will be around to stay even longer. Even if you don't use the OS you have reaped benefits of the work. It's never too late to understand what you are missing out.

#GrapheneOS

nice to see more GOS mods on nostr, GOS is the 🐐πŸ’ͺ🏻

Replying to Avatar jb55

🍿

can't wait for it to go to zero 😌