os-issue-tracker VS GrapheneOS-Knowledge

Compare os-issue-tracker vs GrapheneOS-Knowledge and see what are their differences.

os-issue-tracker

Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers. (by GrapheneOS)

GrapheneOS-Knowledge

This is a short description of some of the knowledge I've collected on GrapheneOS and some common questions I've been asked and my answers to them. (by Peter-Easton)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
os-issue-tracker GrapheneOS-Knowledge
46 3
323 72
6.5% -
1.8 0.0
about 3 years ago about 2 years ago
HTML
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

os-issue-tracker

Posts with mentions or reviews of os-issue-tracker. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-12-21.

GrapheneOS-Knowledge

Posts with mentions or reviews of GrapheneOS-Knowledge. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-09-02.
  • NitroPhone – “Most Secure Android on the Planet”
    7 projects | news.ycombinator.com | 2 Sep 2021
    This is just one example (linked below) but I've seen a fair bit of this type of behaviour just specifixally from the project founder/leader. There does seem to be a lot of other more level-headed folk involved with the project too however so not sure how insurmountable the problem is.

    https://github.com/Peter-Easton/GrapheneOS-Knowledge/issues/...

  • Making Librem 5 Apps
    3 projects | news.ycombinator.com | 11 Apr 2021
    The Librem 5 is not as open or libre as its marketing has tried to insinuate, simply having its binary blob signed and validated firmware saved in write-protected read-only memory and loaded by a secondary coprocessor to exploit a loophole in the definiton of "libre" hardware to allow it to qualify for the FSF's definiton of "Free" hardware. This renders the firmware unupdateable without shorting a connection. In the event a vulnerability is discovered in the modems or radios, the firmware cannot be updated without physically dismantling the phone. Firmware initialization is also no longer under the control of the host operating system because the initialization is carried out from outside the OS: changing or updating software on the host will not address these design defects. Although the modems and radios are not attached to the host via DMA, they rely on USB for isolation, which simply shifts the trust from the kernel driver to the kernel USB stack, and USB was never designed with distrusting the device plugged into it in mind unlike SMMU/IOMMU, which is specifically designed to mitigate unconstrained DMA.

    Current releases of the Librem 5 have been plagued by thermal throttling issues and poor battery life which in some cases has clocked in at less than 1 hour at idle.

    The Librem 5 does not even support software encryption and no progress has been made toward adding even LUKS encryption. The Librem 5 lacks a secure element for any hardware binding on the encryption and so would be entirely dependent on software-only encryption.

    The rebranded version of Debian that the Librem 5 uses as an operating system uses the same security model as the desktop stack, which is a perimeter or "all or nothing" security model. In the future, applications may be installed utilizing FlatPak. The threat model and measures FlatPak takes to meet it are as of yet unclear and uncertain.

    From https://github.com/Peter-Easton/GrapheneOS-Knowledge/blob/ma...

What are some alternatives?

When comparing os-issue-tracker and GrapheneOS-Knowledge you can also consider the following projects:

DuOTP-android - small GPL3+ Android app that allows you to log in to some Duo-protected services with a standard OTP app

Pine64-Arch - :penguin: Arch Linux ARM for your PinePhone/Pro and PineTab/2

Vanadium - Privacy and security enhanced releases of Chromium for GrapheneOS. Vanadium provides the WebView and standard user-facing browser on GrapheneOS. It depends on hardening in other GrapheneOS repositories and doesn't include patches not relevant to the build targets used on GrapheneOS.

bromite - Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser!

privileged-extension

axolotl - A Signal compatible cross plattform client written in Go, Rust and Vuejs

grapheneos.org - Main website servers

README - Start here

axolotl - Go ahead and axolotl questions

platform_packages_apps_Settings