GrapheneOS-Knowledge
bromite
GrapheneOS-Knowledge | bromite | |
---|---|---|
3 | 496 | |
72 | 5,702 | |
- | 0.4% | |
0.0 | 0.0 | |
about 2 years ago | 4 months ago | |
HTML | ||
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
GrapheneOS-Knowledge
-
NitroPhone – “Most Secure Android on the Planet”
This is just one example (linked below) but I've seen a fair bit of this type of behaviour just specifixally from the project founder/leader. There does seem to be a lot of other more level-headed folk involved with the project too however so not sure how insurmountable the problem is.
https://github.com/Peter-Easton/GrapheneOS-Knowledge/issues/...
-
Making Librem 5 Apps
The Librem 5 is not as open or libre as its marketing has tried to insinuate, simply having its binary blob signed and validated firmware saved in write-protected read-only memory and loaded by a secondary coprocessor to exploit a loophole in the definiton of "libre" hardware to allow it to qualify for the FSF's definiton of "Free" hardware. This renders the firmware unupdateable without shorting a connection. In the event a vulnerability is discovered in the modems or radios, the firmware cannot be updated without physically dismantling the phone. Firmware initialization is also no longer under the control of the host operating system because the initialization is carried out from outside the OS: changing or updating software on the host will not address these design defects. Although the modems and radios are not attached to the host via DMA, they rely on USB for isolation, which simply shifts the trust from the kernel driver to the kernel USB stack, and USB was never designed with distrusting the device plugged into it in mind unlike SMMU/IOMMU, which is specifically designed to mitigate unconstrained DMA.
Current releases of the Librem 5 have been plagued by thermal throttling issues and poor battery life which in some cases has clocked in at less than 1 hour at idle.
The Librem 5 does not even support software encryption and no progress has been made toward adding even LUKS encryption. The Librem 5 lacks a secure element for any hardware binding on the encryption and so would be entirely dependent on software-only encryption.
The rebranded version of Debian that the Librem 5 uses as an operating system uses the same security model as the desktop stack, which is a perimeter or "all or nothing" security model. In the future, applications may be installed utilizing FlatPak. The threat model and measures FlatPak takes to meet it are as of yet unclear and uncertain.
From https://github.com/Peter-Easton/GrapheneOS-Knowledge/blob/ma...
bromite
-
The confusing CalyxOS-supplied Chromium
Our goal with the Chromium provided in CalyxOS has been to provide a browser with a solid base of privacy and security enhancements vs Chromium (and by extension, vs Chrome) while still allowing most sites and WebView-based apps to function as expected out of the box. We do this by using select changes from Cromite (and prior to that, Bromite). Some of these include the under-the-hood deactivation of intrusive features and analytics, while others provide additional site settings to adjust features like WebGL and WebRTC, features which are sometimes necessary but which can aid in fingerprinting or identification when turned on. We also bring in the legacy ad blocker from Bromite/Cromite to offer some reasonable protection from the worst kinds of ads. You can find and adjust these features in Settings.
-
Top 10 Android Apps in 2013 (not available on the Google Play Store)
https://github.com/bromite/bromite Browser (based on Chrome)
-
Nexus 7 Flox: flo-deb_clamor_repartition_20201203.zip unavailable
Normally, I'd recommend Bromite as a lightweight Chromium-based browser with built-in adblocking, but the project appears to be asleep right now. It might be worth checking it in a few weeks, though.
- Should I get the Bromite SystemWebView?
-
Alternative to Samsung Internet - Android browser with bottom back & forward buttons (not hidden)
Bromite via either its site/Fdroid, GitHub or Woolyss site has a bottom bar available in accessibility settings. (The first one has been unmaintained for a while, but has auto updates available if they ever drop. The other two are up to date but must be updated manually.)
-
the best browser
Bromite hasn't been updated since December: https://github.com/bromite/bromite/releases
-
Daniel Micay steps down as the leader of GrapheneOS. My thoughts and why you should keep using it.
context: https://github.com/bromite/bromite/issues/2141
- Did Louis Rossman gaslight his audience about grapheneOS's lead developer?
- At what point do you stop caring about your privacy?
- GrapheneOS – Corporate FOSS loving witch hunting crybullies feat. PrivacyGuides and DivestOS
What are some alternatives?
Pine64-Arch - :penguin: Arch Linux ARM for your PinePhone/Pro and PineTab/2
brave-browser - Brave browser for Android, iOS, Linux, macOS, Windows.
os-issue-tracker - Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers.
ungoogled-chromium - Google Chromium, sans integration with Google
axolotl - A Signal compatible cross plattform client written in Go, Rust and Vuejs
mulch
README - Start here
Mull - [DEPRECATED See Mull-Fenix] Build scripts for a web browser built upon Mozilla technology
axolotl - Go ahead and axolotl questions
ungoogled-chromium-android - Android build for ungoogled-chromium
iceraven-browser - Iceraven Browser
uBlock - uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.