Open source privacy and security focused mobile OS with Android app compatibility.

  • 44 Posts
  • 47 Comments
Joined 2 years ago
cake
Cake day: November 27th, 2022

help-circle

































  • @[email protected]

    > would love to see GrapheneOS develop further and be properly allowed to pass play integrity API.

    We fully preserve the privacy/security model and then substantially improve it. We use all of the same hardware-based security features as the stock Pixel OS but also a lot more including MTE (hardware memory tagging), PAC/BTI for userspace too, hardware-level disabling of new USB connections, USB data and the overall port for our USB-C port control feature and other features.


  • @daedaevibin It’s not a partition. It gets flashed to the secure element via an API provided by the secure element. The fastboot firmware implemented support for flashing it via the image flashing interface. There’s also not actually a bootloader partition but rather those are containers with images nested inside. There a whole bunch of boot firmware images flashed to separate partitions from bootloader.img. An over-the-air update has them as separate images, not bundled into the bootloader.img.




  • @[email protected]

    > It seems to be a more efficient way to get it into the system for verification properly instead of other methods I’ve seen.

    There is no other way to flash a key to the secure element for verified boot. That is how verified boot is implemented for an alternate OS. Both of our install processes flash the verified boot public key after flashing the OS. We were the first ones to ever use this functionality before they had official documentation, and we made the initial AOSP docs.