Skip Navigation
GrapheneOS

An unofficial discussion community for anyone interested in GrapheneOS.

Helpful links:

Official Graphene OS Discussion Forum

List of official Matrix channels and other contact sources.

Members
445
Posts
39
Active Today
2
Created
2 yr. ago
  • GrapheneOS @lemmy.sdf.org
    StarkZarn @infosec.pub

    5g issues on mint mobile pSIM

    About a month ago I switched from Google Fi to Mint Mobile. I figured since they were both T-Mobile MVNOs the service would the same, and it was a way for me to move away from the Google Fi app requirement, and this the play services requirement on my graphene pixel 8 pro. Everything initially seemed to be working great, then I realized I only ever have LTE. I've tried all the APN settings, auto discovered, manually configured in accordance with the mint documentation, and the T-Mobile APN. They all give me good service, but only ever LTE. Previously on both T-Mobile and Fi, on the same cell towers, I had 5g, so I know it's not a service issue. Mint support is the worst thing I've ever encountered in my life and they're useless as far as troubleshooting. Notably, the other phone on the plan is a stock pixel 7 pro and has the same issue, so I think it's a provisioning issue not a graphene issue, but I figured I'd ask the crowd here because of the general level of aptitude.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Senior Developer Of GrapheneOS Detained & Conscripted - Hiring New Developers

    grapheneos.social GrapheneOS (@[email protected])

    We felt obligated to go public about this but waited a couple weeks to make sure they were safe and that us going public wouldn't harm them. We avoided specifying the country or war to avoid involving GrapheneOS in a debate on forced conscription in an existential defensive war.

    One of our two senior developers has been forcibly detained and conscripted to participate in a war. When they first went missing, we revoked their repository access as a precaution. We soon learned their disappearance was completely unrelated to GrapheneOS. Our priority has been keeping them safe.

    We've used our available connections to try to keep them safe. There's no way to get them out of the conscription. However, they're an incredibly talented security researcher and engineer and it would be extraordinarily misguided to send them to front line combat. This seems to be understood now.

    GrapheneOS development and updates have continued and will keep going. We have substantial funds available to hire more people to work on GrapheneOS. We'll need to hire multiple experienced developers to fill their big shoes. They'll hopefully be safe and when they return we'll have a bigger team.

    If you're an experienced AOSP developer interested in working full time on GrapheneOS

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS Foundation Now Hiring Remote Developers

    grapheneos.social MetropleX (@[email protected])

    Attached: 1 image GRAPHENEOS IS HIRING Are you an experienced AOSP developer? Interested in working full time, fully remotely on GrapheneOS? Can you hit the ground running? https://grapheneos.org/hiring Global opportunity paid via Wise (local bank transfers), BTC, ETH or XMR.

    MetropleX (@metr0pl3x@grapheneos.social)

    GRAPHENEOS IS HIRING

    Are you an experienced AOSP developer?

    Interested in working full time, fully remotely on GrapheneOS?

    Can you hit the ground running?

    https://grapheneos.org/hiring

    Global opportunity paid via Wise (local bank transfers), BTC, ETH or XMR.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    AOSP 15 QPR2 Fingerprint Reader Bug Now Fixed

    grapheneos.social GrapheneOS (@[email protected])

    There's a high chance this was a firmware-related issue where it wouldn't have been feasible for us to fix it. Our users reported it early in testing, but we couldn't reproduce it. Nearly every report we got was a non-Pro variant of the Pixel 9, only a couple reports elsewhere.

    The fingerprint reader issue introduced by Android 15 QPR2 in March 2025 has been resolved by the monthly Android update for April 2025. This issue caused the fingerprint reader to become unavailable after reboot for a small subset of users nearly entirely on the non-Pro Pixel 9.

    Android 15 QPR2 is the 2nd quarterly release of Android 15 and was released on March 4th. Our initial release based on it was on March 5th:

    https://grapheneos.org/releases#2025030500

    Our users reported the issue during our public testing for this release but it was impractical for us to resolve.

    On March 8th, we made our 3rd release based on Android 15 QPR2 (https://grapheneos.org/releases#2025030800). Prior to it reaching the Stable channel later that day, we posted [https://discuss.grapheneos.org/d/20636-workaround-for-android-15-qpr2-fingerprint-firmware-glitch-on-pixel-9](https://discuss.graphe

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS Pixel 9a Public Testing Soon

    grapheneos.social GrapheneOS (@[email protected])

    We're working on completing GrapheneOS support for the Pixel 9a. If you have a Pixel 9a and are interested in testing experimental GrapheneOS builds later today, please join our testing chat room on either Discord or Matrix which are bridged together. https://grapheneos.org/contact#community-chat

    We're working on completing GrapheneOS support for the Pixel 9a. If you have a Pixel 9a and are interested in testing experimental GrapheneOS builds later today, please join our testing chat room on either Discord or Matrix which are bridged together.

    https://grapheneos.org/contact#community-chat

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS QPR2 Based On AOSP 15 Development and Pixel 9a Support Progress

    grapheneos.social GrapheneOS (@[email protected])

    Pixel 9a device branch tags are currently being pushed to AOSP. Kernel tags are going to be pushed after the non-kernel tags are pushed. That's means it will be a while longer before the monthly update is fully published. Going to make adding Pixel 9a support take a bit longer.

    Our 2025040700 release was an early April 2025 security update release based on the Android Security Bulletin backports.

    April 2025 monthly release of Android 15 QPR2 is in the process of being published today and we'll make a new release after the tags are all pushed to AOSP.

    Today is also the launch day for the Pixel 9a. The tags for the Pixel 9a should get pushed to AOSP after the monthly update is fully pushed.

    Once that's pushed and we've released the April update of Android 15 QPR2, we can start working on adding Pixel 9a support to GrapheneOS.

    We have a Pixel 9a ordered for our main device farm which has been marked as ready for pickup by the delivery company. It will hopefully be delivered tomorrow. We've generated signing keys and added preliminary support to Auditor and AttestationServer which will need testing.

    April 2025 update for the Pixel 9a stock OS is still based on Android 15 QPR1 rather than Android 15 QPR2. They updated the device branch t

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Vanadium version 135.0.7049.100.0 released

    Changes in version 135.0.7049.100.0:

    • update to Chromium 135.0.7049.100

    A full list of changes from the previous release (version 135.0.7049.79.0) is available through the Git commit log between the releases.

    This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS Pixel 9a Public Testing Begins

    grapheneos.social GrapheneOS (@[email protected])

    GrapheneOS for the Pixel 9a support is no longer considered experimental. Since it's still based on Android 15 QPR1 upstream, it's missing some recent improvements in Android and GrapheneOS but we backported most post-QPR2 GrapheneOS changes and it'll be on mainline Android soon.

    Our initial highly experimental release for the Pixel 9a is now available for both CLI and web install via https://staging.grapheneos.org/.

    We've tested both install methods and did basic testing of functionality including Wi-Fi, camera, audio, etc. Feedback is needed from users now.

    We've tested the over-the-air upgrade path for the Pixel 9a internally via a sample update with no changes. We usually only use these sample updates internally for testing the upgrade path of each release. However, for broader testing, we're releasing it through each channel now.

    First update from the initial 2025041200 release to the new 2025041201 release has no changes beyond build date and build number. The incremental (delta) update package is only 158KiB despite it shipping the full new firmware and OS images. We tested a full update package too.

    Basic functionality has been tested for a while along with the upgrade path via both our System Upd

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS version 2025041100 released

    Tags:

    • 2025041100 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, emulator, generic, other targets)

    Changes since the 2025040700 release:

    • full 2025-04-05 security patch level
    • rebased onto BP1A.250405.007.D1 Android Open Source Project release
    • remove code for Qualcomm XTRA (PSDS) privacy improvements since we no longer have any devices with Qualcomm GNSS and we can add it back in the future if we need it again rather than porting it forward under the assumption we'll be using it
    • fix upstream RecoverySystem.verifyPackage(...) vulnerability (this was not directly exploitable due to there being 2 layers of update package signature verification and downgrade protection, but the first layer of protection should work properly to avoid a vulnerability in
  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Porting GrapheneOS To Pixel 9a Is Underway

    grapheneos.social GrapheneOS (@[email protected])

    Android Security Bulletins often contain backports of patches already shipped in earlier months. Various patches in the April 2025 Android security bulletin were already shipped by Android 15 QPR2 in March. The new Android release each month is a separate thing from the bulletin.

    Porting GrapheneOS to the Pixel 9a is now well under way. Pixel 9a is still using Android 15 QPR1 rather than Android 15 QPR2. We had to create a special branch for it based on taking our final Android 15 QPR1 release (2025030300) and rebasing it onto the Pixel 9a release tags.

    Android 15 QPR2, 2nd quarterly release of Android 15, was released March 2025. Since Android 14 QPR2, quarterly releases are based off the development branch with as many changes as yearly releases. Many changes are behind feature flags and yearly releases enable far more flags.

    Pixel 8a launched in mid May 2024 still using Android 14 QPR1 instead of Android 14 QPR2 released in March 2024. The device branch for the Pixel 8a went away the next month when Android 14 QPR3 was released. This year's June release is Android 16 rather than Android 15 QPR3.

    We've backported a subset of the changes since 2025030300 to our Pixel 9a device branch including an import sandboxed Google Play compatibility laye

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS Servers Upgraded To OpenSSL 3.5.0 With Post Quantum Cryptography

    grapheneos.social GrapheneOS (@[email protected])

    OpenSSL 3.5.0 was recently released with support for Post Quantum Cryptography (PQC). The package update is now deployed across our servers. Our web services now use hybrid PQC key exchange with clients supporting it. Easy to confirm X25519MLKEM768 gets used in Chromium browsers.

    OpenSSL 3.5.0 was recently released with support for Post Quantum Cryptography (PQC). The package update is now deployed across our servers. Our web services now use hybrid PQC key exchange with clients supporting it. Easy to confirm X25519MLKEM768 gets used in Chromium browsers.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Secure PDF Viewer app version 27 released

    github.com Release 27 · GrapheneOS/PdfViewer

    Notable changes in version 27: update pdf.js library to 5.1.91 raise minimum Chromium WebView version to 133 and use it as the build target add redundant setBlockNetworkLoads(true) for the WebView...

    Release 27 · GrapheneOS/PdfViewer

    Notable changes in version 27:

    • update pdf.js library to 5.1.91
    • raise minimum Chromium WebView version to 133 and use it as the build target
    • add redundant setBlockNetworkLoads(true) for the WebView (this is already the default due to not having the INTERNET permission, but being more explicit about this is a good thing)
    • update esbuild to 0.25.2
    • update dependencies of npm dependencies
    • update AndroidX Core KTX library to 1.16.0
    • update Android Gradle plugin to 8.9.1
    • update Kotlin to 2.1.20
    • update Gradle to 8.13

    A full list of changes from the previous release (version 26) is available through the Git commit log between the releases.

    Simple Android PDF viewer based on pdf.js and content providers. The app doesn't require any permissions. The PDF stream is fed into the sandboxed WebView without giving it access to the network, files, content providers or any other data.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Auditor app version 88 released

    github.com Release 88 · GrapheneOS/Auditor

    Notable changes in version 88: add support for Pixel 9a with either the stock OS or GrapheneOS require TLSv1.3 instead of either TLSv1.2 or TLSv1.3 drop legacy USE_FINGERPRINT permission since we ...

    Release 88 · GrapheneOS/Auditor

    Notable changes in version 88:

    • add support for Pixel 9a with either the stock OS or GrapheneOS
    • require TLSv1.3 instead of either TLSv1.2 or TLSv1.3
    • drop legacy USE_FINGERPRINT permission since we dropped Android 9 support a while ago
    • update Bouncy Castle library to 1.80
    • update CameraX (AndroidX Camera) library to 1.4.2
    • update AndroidX Core library to 1.16.0
    • update Guava library to 33.4.7
    • update Android NDK to 28.0.13004108
    • update Android Gradle plugin to 8.9.1
    • update Kotlin to 2.1.20
    • update Gradle to 8.13
    • minor improvements to code quality
    • exclude unused OSGI manifests to avoid file conflicts

    A full list of changes from the previous release (version 87) is available through the Git commit log between the releases.

    The Auditor app uses hardware security features on supported devices to validate the integrity of the operating system from another Android

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Secure PDF Viewer app version 28 released

    github.com Release 28 · GrapheneOS/PdfViewer

    Notable changes in version 28: add back JPEG 2000 image support unintentionally removed in PDF Viewer version 27 due to pdf.js splitting it out add JavaScript fallback for JPEG 2000 image support ...

    Release 28 · GrapheneOS/PdfViewer

    Notable changes in version 28:

    • add back JPEG 2000 image support unintentionally removed in PDF Viewer version 27 due to pdf.js splitting it out
    • add JavaScript fallback for JPEG 2000 image support for when the WebView JIT is disabled
    • improve CMYK to RGB conversion when the WebView JIT is enabled via ICC profile support provided by the pure Rust qcms library compiled to WebAssembly

    A full list of changes from the previous release (version 27) is available through the Git commit log between the releases.

    Simple Android PDF viewer based on pdf.js and content providers. The app doesn't require any permissions. The PDF stream is fed into the sandboxed WebView without giving it access to the network, files, content providers or any other data.

    Content-Security-Policy is used to enforce that the JavaScript and styling properties within the WebView are entirely static content from the APK assets along

  • GrapheneOS @lemmy.sdf.org
    DahGangalang @infosec.pub

    App Store Recommendations

    Just recently took the leap to Graphene OS from stock android.

    One problem I'm having is getting my apps and keeping them updated. Obviously I've been trying to use F-Droid, Accrescent, and the Grapheme provided app store where I can, but work and friends require me to have apps not available there.

    I've been using Aurora Store for everything else, but it seems really buggy (tons of instances where apps won't update, will need ~3 tries to properly install, will notify me there was an error when the app clearly installed, etc). Additionally, I saw somewhere that Aurora store has some privacy/security issues (but didn't dive deeper to see what was meant by that).

    I've read Obtanium is another option, but it looks like that still will not meet all my needs.

    I suppose I should also say that I'm hesitant to use the Play Store / Play Services at all. I get there's sandboxing around them that makes them less invasive, but I don't full grasp how Graphene accomplishes that / what specifica

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Vanadium version 135.0.7049.79.0 released

    Changes in version 135.0.7049.79.0:

    • update to Chromium 135.0.7049.79

    A full list of changes from the previous release (version 135.0.7049.38.0) is available through the Git commit log between the releases.

    This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS's New Update Server Infrastructure

    grapheneos.social GrapheneOS (@[email protected])

    We also need to figure out the separate issue of needing more VPS instances broadly distributed around the world for our network services like network time. We aren't yet sure how large our own Wi-Fi AP database for network location is going to be so we aren't sure on specs yet.

    New 25Gbps sponsored server from Macarne is now handling all of our OS/package update traffic for Europe, Africa, Middle East, Central Asia and South Asia:

    https://grapheneos.social/@GrapheneOS/114264453740567840

    We're looking into the several offers we received for new servers in East and West North America.

    Rolling out our recent relatively small OS update with an 70M delta to Stable for all devices uses ~2Gbps for ~6 hours in Europe after a short 3Gbps spike. It then gradually drops. Europe handles ~40% more than North America. Quarterly/yearly updates tend to be 400MB to 800MB.

    We also need to figure out the separate issue of needing more VPS instances broadly distributed around the world for our network services like network time. We aren't yet sure how large our own Wi-Fi AP database for network location is going to be so we aren't sure on specs yet.

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    Two More Vulnerabilities Found To Be Exploited In The Wild and GrapheneOS Prevented Them

    grapheneos.social GrapheneOS (@[email protected])

    https://discuss.grapheneos.org/d/20401-grapheneos-improvements-to-protection-against-data-extraction-since-2024 covers how we've greatly improved the GrapheneOS defenses against these attacks since early 2024. We're continuing to work on improving it. We helped get firmware security improvements to...

    Android Security Bulletin for April 2025 has 2 more vulnerabilities marked as being exploited in the wild.

    GrapheneOS fully prevented exploiting both vulnerabilities for locked devices, made both far harder to exploit while unlocked and already had both patched for a while too.

    CVE-2024-53150: heap overflow (read) in a Linux kernel USB sound card driverCVE-2024-53197: heap overflow (write) in a Linux kernel USB sound card driver

    These vulnerabilities were being exploited by Cellebrite for data extraction from locked Android devices without GrapheneOS.

    We have a post from late February about CVE-2024-53197 and 2 other bugs exploited by Cellebrite which they were blocked from exploiting by GrapheneOS:

    https://discuss.grapheneos.org/d/20402-cellebrite-exploits-used-to-target-serbian-student-activist

    CVE-2024-53150 is almost certainly part of the same batch of vulnerabilities they’ve been exploiting.

    https://discuss.grapheneos.org/d/20401-grapheneos-improvements-to-protectio

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS version 2025040700 released

    This is an early April security update release based on the April 2025 security patch backports since the monthly Android Open Source Project and stock Pixel OS release scheduled for this month hasn’t been published yet.

    Tags:

    2025040700 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, emulator, generic, other targets) Changes since the 2025040400 release:

    full 2025-04-01 security patch level

  • GrapheneOS @lemmy.sdf.org
    cm0002 @lemmy.world

    GrapheneOS version 2025040400 released

    Tags:

    • 2025040400 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, emulator, generic, other targets)

    Changes since the 2025032500 release:

    • Sandboxed Google Play compatibility layer: remove StatsManager from hidden services and replace that approach with stubbing out all of the methods since Play services recently introduced new code using it that's missing a null check and triggers a null pointer exception which has blocked us from pushing out the newer versions of Play services beyond our App Store's Alpha channel
    • Network Location: switch to making at most a single request to the service per position estimation by requesting up to 40 Wi-Fi APs at once
    • Network Location: optimize making requests to the service for Wi-Fi AP data
    • Network Location: opt