os_issue_tracker VS platform_manifest

Compare os_issue_tracker vs platform_manifest and see what are their differences.

os_issue_tracker

Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers. [Moved to: https://github.com/GrapheneOS/os-issue-tracker] (by GrapheneOS)

platform_manifest

Repo manifest for the GrapheneOS mobile privacy and security hardening project. (by GrapheneOS)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
os_issue_tracker platform_manifest
9 5
101 273
- 2.6%
1.0 8.2
about 3 years ago 7 days ago
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

os_issue_tracker

Posts with mentions or reviews of os_issue_tracker. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-04-09.
  • I have been FACEBOOKED without ever owning a Facebook account. How could I have avoided it? Facebook needs to pay for this.
    2 projects | /r/privacy | 9 Apr 2021
    I did not say it is Google-free, I said that it can be made as Google-free as you want it to be without too much difficulty. In what way is Graphene more Google-free than LineageOS? [Graphene advertises]("No Google apps or services") - LineageOS doesn't have any either, by itself. If you're talking about connectivity check / captive portal detection, LineageOS can easily be switched away from Google's servers. Are you talking about A-GPS / SUPL? I'm not sure what Graphene does these days, but it has apparently used Google in the past. (Note also the statement here that "The project does not aim to avoid Google services in particular but rather privacy issues in general."
  • Essential Phone
    1 project | /r/Visible | 18 Feb 2021
  • Pine64 Februrary Update: Show and Tell
    5 projects | news.ycombinator.com | 15 Feb 2021
    > He is also, in my opinion, overworked.

    It would certainly help if people like yourself were not prolifically spreading misinformation and false claims about the project and myself. Luckily, I am not writing most of the GrapheneOS code at this time.

    > packages/apps/Gallery/src/com/android/camera/MenuHelper.java (calls maps.google.com)

    Not used.

    > packages/apps/Settings/src/com/android/RadioInfo.java (multiple connectivity checks pinging Google servers)

    This is a developer / debugging UI with ping buttons doing what they say on the tin.

    > external/webrtc/webrtc/p2p/stunprober/main.cc (uses a Google STUN server)

    Code is not included in the OS.

    > packages/apps/Nfc/src/com/android/nfc/P2pLinkManager.java

    The code is not used, and it doesn't do what you say. It's code for creating and sending a link to an app on the Play Store. It isn't code for accessing it.

    > And BTW again, this says nothing about SUPL, which is still tracked as an issue about which there isn't a lot of clarity: https://github.com/GrapheneOS/os_issue_tracker/issues/96

    It is clear to us and I've explained it here.

    There is nothing that needs to be rationalized away but rather you grepped through the code and your confirmation bias + lack of research led you to make bad assumptions.

    You didn't submit issue reports, patches or even make an attempt to talk about this. If you had, it could have been explained that you were making mistakes. Perhaps you could have done something useful instead of wasting your time. Perhaps you could have informed yourself instead of leading yourself astray with your confirmation bias and assumptions. It doesn't really matter now. Please stop spreading misinformation about GrapheneOS and myself though. Leave us out of it.

    I think it says a lot that your post was the highest voted and that spreading misinformation and making false claims is how you folks choose to operate. You do not do useful work, but rather try to hurt projects that do, in order to promote something else. Maybe you should promote it based on the merits instead of with false claims about us. I'm not sure why you're comparing our privacy and security hardening work with a hardware project which it could be used on in the first place.

    If a 'strong personality' means an intolerance for dishonesty then that's certainly the case. Unfortunately, certain companies focused entirely on marketing / branding take the approach of spreading misinformation about others because they do not have any substance themselves. Producing an incredibly insecure product but branding it as secure and attacking others is par for the course. That's pretty much the whole privacy and security industry.

    GrapheneOS is a non-profit open source project and we'll continue doing our work regardless of these kinds of continued attempts to spread misinformation about it and cause harm to us. Companies and products will come and go. We'll still be working on genuine privacy and security improvements across the software and hardware world in one way or another. We are not trying to sell a product and we don't have this motivation to tear down others with misinformation. If it's bad, then we'll say so. Our documentation is very honest about what we provide and what we don't provide in the various projects we work on. It is very open about the trade-offs of the design choices, etc. We're confident that the project will succeed on the merits without needing to make up a lot of BS about it and about others. We intend to work with hardware partners and others with the same kinds of goals and approach: providing a high level of privacy and security alongside usability, with an approach that's open and honest.

    We won't attach our name to a device that did not meet a high level of privacy and security by shipping a modern, properly configured SoC for production use with proper support for firmware, etc. for years and all the standard hardware security features (verified boot, HSM-based attestation, HSM-based keystore, strong hardware encryption / key derivation support, proper IOMMUs, modern exploit mitigations, and all the other stuff we expect). We'll happily include minor bonuses like a Sensors Off kill switch that truly works as a mitigation for a device compromise based on a clear threat model for that (i.e. if it's meant to do something like stopping audio recording, then the speakers and all the sensors usable for that have to be dealt with too). We're 100% open to working with a vendor sharing those kinds of goals.

  • Boot loader unlock for pixel 4a
    1 project | /r/GrapheneOS | 25 Dec 2020
    If your question is related to a feature request, please check the issue trackers. OS issue tracker, Vanadium, for other GrapheneOS project check the Reporting issues.
  • GrapheneOS doubts (compartmentalization, PWA... )
    3 projects | /r/privacytoolsIO | 25 Dec 2020
    See https://github.com/GrapheneOS/os_issue_tracker/issues/88 about a feature that's planned to make the user experience better by adding support for displaying the lockscreen censored version of notifications from other profiles if desired.
  • Using Gos Phone As Hotspot For My Laptop
    1 project | /r/GrapheneOS | 21 Dec 2020
    If your question is related to a feature request, please check the issue trackers. OS issue tracker, Vanadium, for other GrapheneOS project check the Reporting issues.

platform_manifest

Posts with mentions or reviews of platform_manifest. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-12-08.

What are some alternatives?

When comparing os_issue_tracker and platform_manifest you can also consider the following projects:

os-issue-tracker - Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers.

platform_frameworks_base

grapheneos.org - Main website servers

Vanadium - Privacy and security enhanced releases of Chromium for GrapheneOS. Vanadium provides the WebView and standard user-facing browser on GrapheneOS. It depends on hardening in other GrapheneOS repositories and doesn't include patches not relevant to the build targets used on GrapheneOS.

platform_external_vanadium - Vanadium integration for GrapheneOS. See https://github.com/GrapheneOS/Vanadium for the Vanadium build configuration and patches.

Auditor - Hardware-based attestation / intrusion detection app for Android devices. It provides both local verification with another Android device via QR codes and optional scheduled server-based verification with support for alert emails. It uses hardware-backed keys and attestation support as the foundation and chains trust to the app for software checks.

Camera - Modern camera app focused on privacy and security with QR & barcode scanning.

platform_manifest