os-issue-tracker
GrapheneOS-Knowledge
os-issue-tracker | GrapheneOS-Knowledge | |
---|---|---|
46 | 3 | |
323 | 72 | |
6.5% | - | |
1.8 | 0.0 | |
about 3 years ago | about 2 years ago | |
HTML | ||
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
os-issue-tracker
-
A closer look at e/OS: Murena's privacy-first 'deGoogled' Android alternative
> Everything works including Google Pay.
Wait, what? What did I miss here -> https://github.com/GrapheneOS/os-issue-tracker/issues/1986 ?
-
Mobile apps illegally share your personal data
Thanks, I should take a look. I've also been meaning to try DivestOS.
I'm certainly not holding my breath on more GrapheneOS support, as so few people care. I'm not entirely sure it'd be the right fit for me anyway. I'm currently using a microg setup with lsposed so I can patch out some junk in modern apps (like Outlook trying to be device admin), and this kind of hooking is not something GrapheneOS is interested in (a feature request I opened a while back: https://github.com/GrapheneOS/os-issue-tracker/issues/284).
-
Fingerprint unlocking not always available
There's an upstream bug from AOSP where the fingerprint sometimes isn't shown after switching profiles. It's existed since a while, but has become more prevalent since the Android 13 QPR3 release last month. You can track that issue here: https://github.com/GrapheneOS/os-issue-tracker/issues/1611
- Google Play Services Required on Android for 2fa Keys?
-
Pixel 6a: Annoying echo during calls, please help me fix.
https://github.com/GrapheneOS/os-issue-tracker/issues/2221 Someone recently opened this issue. Was this you?
-
Google geolocation issue
But indeed, it's annoying for apps which continually request it, so there is an open feature request to have the option to disable that: https://github.com/GrapheneOS/os-issue-tracker/issues/1886
- Problems with Google Maps
-
Switching back to CalyxOS
Also, before I get attacked that GrapheneOS can do this, here is an issue where the lead developer says the feature is not wanted.
-
Unique benefits of owning a Pixel
As of March they've confirmed that a suitably non-invasive spoof for Device Integrity will be implemented, more on the complexities here. It's not that it can't be done, it will just take some time for an elegant solution meeting GOS standards.
-
GrapheneOS & Microsoft Teams w/ Intune: Will it work?
See the issue here: https://github.com/GrapheneOS/os-issue-tracker/issues/1938
GrapheneOS-Knowledge
-
NitroPhone – “Most Secure Android on the Planet”
This is just one example (linked below) but I've seen a fair bit of this type of behaviour just specifixally from the project founder/leader. There does seem to be a lot of other more level-headed folk involved with the project too however so not sure how insurmountable the problem is.
https://github.com/Peter-Easton/GrapheneOS-Knowledge/issues/...
-
Making Librem 5 Apps
The Librem 5 is not as open or libre as its marketing has tried to insinuate, simply having its binary blob signed and validated firmware saved in write-protected read-only memory and loaded by a secondary coprocessor to exploit a loophole in the definiton of "libre" hardware to allow it to qualify for the FSF's definiton of "Free" hardware. This renders the firmware unupdateable without shorting a connection. In the event a vulnerability is discovered in the modems or radios, the firmware cannot be updated without physically dismantling the phone. Firmware initialization is also no longer under the control of the host operating system because the initialization is carried out from outside the OS: changing or updating software on the host will not address these design defects. Although the modems and radios are not attached to the host via DMA, they rely on USB for isolation, which simply shifts the trust from the kernel driver to the kernel USB stack, and USB was never designed with distrusting the device plugged into it in mind unlike SMMU/IOMMU, which is specifically designed to mitigate unconstrained DMA.
Current releases of the Librem 5 have been plagued by thermal throttling issues and poor battery life which in some cases has clocked in at less than 1 hour at idle.
The Librem 5 does not even support software encryption and no progress has been made toward adding even LUKS encryption. The Librem 5 lacks a secure element for any hardware binding on the encryption and so would be entirely dependent on software-only encryption.
The rebranded version of Debian that the Librem 5 uses as an operating system uses the same security model as the desktop stack, which is a perimeter or "all or nothing" security model. In the future, applications may be installed utilizing FlatPak. The threat model and measures FlatPak takes to meet it are as of yet unclear and uncertain.
From https://github.com/Peter-Easton/GrapheneOS-Knowledge/blob/ma...
What are some alternatives?
DuOTP-android - small GPL3+ Android app that allows you to log in to some Duo-protected services with a standard OTP app
Pine64-Arch - :penguin: Arch Linux ARM for your PinePhone/Pro and PineTab/2
Vanadium - Privacy and security enhanced releases of Chromium for GrapheneOS. Vanadium provides the WebView and standard user-facing browser on GrapheneOS. It depends on hardening in other GrapheneOS repositories and doesn't include patches not relevant to the build targets used on GrapheneOS.
bromite - Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser!
privileged-extension
axolotl - A Signal compatible cross plattform client written in Go, Rust and Vuejs
grapheneos.org - Main website servers
README - Start here
axolotl - Go ahead and axolotl questions
platform_packages_apps_Settings