os_issue_tracker VS grapheneos.org

Compare os_issue_tracker vs grapheneos.org and see what are their differences.

os_issue_tracker

Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers. [Moved to: https://github.com/GrapheneOS/os-issue-tracker] (by GrapheneOS)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
os_issue_tracker grapheneos.org
9 4
101 400
- 2.8%
1.0 9.9
about 3 years ago 5 days ago
HTML
- MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

os_issue_tracker

Posts with mentions or reviews of os_issue_tracker. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-04-09.
  • I have been FACEBOOKED without ever owning a Facebook account. How could I have avoided it? Facebook needs to pay for this.
    2 projects | /r/privacy | 9 Apr 2021
    I did not say it is Google-free, I said that it can be made as Google-free as you want it to be without too much difficulty. In what way is Graphene more Google-free than LineageOS? [Graphene advertises]("No Google apps or services") - LineageOS doesn't have any either, by itself. If you're talking about connectivity check / captive portal detection, LineageOS can easily be switched away from Google's servers. Are you talking about A-GPS / SUPL? I'm not sure what Graphene does these days, but it has apparently used Google in the past. (Note also the statement here that "The project does not aim to avoid Google services in particular but rather privacy issues in general."
  • Essential Phone
    1 project | /r/Visible | 18 Feb 2021
  • Pine64 Februrary Update: Show and Tell
    5 projects | news.ycombinator.com | 15 Feb 2021
    > He is also, in my opinion, overworked.

    It would certainly help if people like yourself were not prolifically spreading misinformation and false claims about the project and myself. Luckily, I am not writing most of the GrapheneOS code at this time.

    > packages/apps/Gallery/src/com/android/camera/MenuHelper.java (calls maps.google.com)

    Not used.

    > packages/apps/Settings/src/com/android/RadioInfo.java (multiple connectivity checks pinging Google servers)

    This is a developer / debugging UI with ping buttons doing what they say on the tin.

    > external/webrtc/webrtc/p2p/stunprober/main.cc (uses a Google STUN server)

    Code is not included in the OS.

    > packages/apps/Nfc/src/com/android/nfc/P2pLinkManager.java

    The code is not used, and it doesn't do what you say. It's code for creating and sending a link to an app on the Play Store. It isn't code for accessing it.

    > And BTW again, this says nothing about SUPL, which is still tracked as an issue about which there isn't a lot of clarity: https://github.com/GrapheneOS/os_issue_tracker/issues/96

    It is clear to us and I've explained it here.

    There is nothing that needs to be rationalized away but rather you grepped through the code and your confirmation bias + lack of research led you to make bad assumptions.

    You didn't submit issue reports, patches or even make an attempt to talk about this. If you had, it could have been explained that you were making mistakes. Perhaps you could have done something useful instead of wasting your time. Perhaps you could have informed yourself instead of leading yourself astray with your confirmation bias and assumptions. It doesn't really matter now. Please stop spreading misinformation about GrapheneOS and myself though. Leave us out of it.

    I think it says a lot that your post was the highest voted and that spreading misinformation and making false claims is how you folks choose to operate. You do not do useful work, but rather try to hurt projects that do, in order to promote something else. Maybe you should promote it based on the merits instead of with false claims about us. I'm not sure why you're comparing our privacy and security hardening work with a hardware project which it could be used on in the first place.

    If a 'strong personality' means an intolerance for dishonesty then that's certainly the case. Unfortunately, certain companies focused entirely on marketing / branding take the approach of spreading misinformation about others because they do not have any substance themselves. Producing an incredibly insecure product but branding it as secure and attacking others is par for the course. That's pretty much the whole privacy and security industry.

    GrapheneOS is a non-profit open source project and we'll continue doing our work regardless of these kinds of continued attempts to spread misinformation about it and cause harm to us. Companies and products will come and go. We'll still be working on genuine privacy and security improvements across the software and hardware world in one way or another. We are not trying to sell a product and we don't have this motivation to tear down others with misinformation. If it's bad, then we'll say so. Our documentation is very honest about what we provide and what we don't provide in the various projects we work on. It is very open about the trade-offs of the design choices, etc. We're confident that the project will succeed on the merits without needing to make up a lot of BS about it and about others. We intend to work with hardware partners and others with the same kinds of goals and approach: providing a high level of privacy and security alongside usability, with an approach that's open and honest.

    We won't attach our name to a device that did not meet a high level of privacy and security by shipping a modern, properly configured SoC for production use with proper support for firmware, etc. for years and all the standard hardware security features (verified boot, HSM-based attestation, HSM-based keystore, strong hardware encryption / key derivation support, proper IOMMUs, modern exploit mitigations, and all the other stuff we expect). We'll happily include minor bonuses like a Sensors Off kill switch that truly works as a mitigation for a device compromise based on a clear threat model for that (i.e. if it's meant to do something like stopping audio recording, then the speakers and all the sensors usable for that have to be dealt with too). We're 100% open to working with a vendor sharing those kinds of goals.

  • Boot loader unlock for pixel 4a
    1 project | /r/GrapheneOS | 25 Dec 2020
    If your question is related to a feature request, please check the issue trackers. OS issue tracker, Vanadium, for other GrapheneOS project check the Reporting issues.
  • GrapheneOS doubts (compartmentalization, PWA... )
    3 projects | /r/privacytoolsIO | 25 Dec 2020
    See https://github.com/GrapheneOS/os_issue_tracker/issues/88 about a feature that's planned to make the user experience better by adding support for displaying the lockscreen censored version of notifications from other profiles if desired.
  • Using Gos Phone As Hotspot For My Laptop
    1 project | /r/GrapheneOS | 21 Dec 2020
    If your question is related to a feature request, please check the issue trackers. OS issue tracker, Vanadium, for other GrapheneOS project check the Reporting issues.

grapheneos.org

Posts with mentions or reviews of grapheneos.org. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-26.

What are some alternatives?

When comparing os_issue_tracker and grapheneos.org you can also consider the following projects:

os-issue-tracker - Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers.

platform_external_vanadium - Vanadium integration for GrapheneOS. See https://github.com/GrapheneOS/Vanadium for the Vanadium build configuration and patches.

platform_manifest - Repo manifest for the GrapheneOS mobile privacy and security hardening project.

platform_packages_apps_Settings

Vanadium - Privacy and security enhanced releases of Chromium for GrapheneOS. Vanadium provides the WebView and standard user-facing browser on GrapheneOS. It depends on hardening in other GrapheneOS repositories and doesn't include patches not relevant to the build targets used on GrapheneOS.

AttestationServer - attestation.app remote attestation server. Server code for use with the Auditor app: https://github.com/GrapheneOS/Auditor. It provides two services: submission of attestation data samples and a remote attestation implementation with email alerts to go along with the local implementation based on QR code scanning in the app.

jadx - Dex to Java decompiler

WebRTC - Home Assistant custom component for real-time viewing of almost any camera stream using WebRTC and other technologies.

hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.

Discourse - A platform for community discussion. Free, open, simple.