Other than GrapheneOS allowing ending user sessions and raising the padding size, this also applies to AOSP on devices with a secure element offering Weaver like the Pixel 2 and later.
This covers the baseline disk encryption.
Apps can use the hardware keystore API to provide another layer of encryption with options like setting keys to be only available when unlocked. Can also be mixed with their own encryption.
Before the Titan M introduced with the Pixel 3, the Pixel 2 used an off-the-shelf NXP security chip to implement Weaver. The implementation is open source:
An attacker with the signing keys for the secure element firmware and the OS cannot update the firmware without authenticating as the owner profile.
Weaver is how a strong level of security is provided for the vast majority of users not using a strong passphrase as their lock method.
A random 6-digit PIN becomes quite hard to bypass when dealing with a secure element with insider attack resistance allowing 1 attempt per day.
User profiles are isolated workspaces with their own disk encryption keys. Consider using them!
Using a secondary user as your main profile is one of our recommendations for high risk users. That way, you can still boot up and use the device without decrypting your main profile.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
This doesn't mean it won't be possible to use apps depending on Play services on GrapheneOS. It means it shouldn't be deeply integrated into the OS as a cross-user, privileged app.
We're going to support installing a Google compatibility layer within a user profile as a regular app. The OS will include minimal support for this in a way that does not compromise the security model. It won't have special privileges other than masquerading as Play services.
We plan to add support for using a GrapheneOS release of microG this way. In the longer term, we also plan to offer a more minimal compatibility layer implemented by pretending that Google services are offline. Both will be options you can choose to install in a specific profile.
@_copperj@grufwub@CopperheadOS No, this is the direct continuation of the original project by the original development team. The project was started before Copperhead was founded and long before it was incorporated. People can confirm this for themselves by looking at the code, dates and published documents.
@_copperj@grufwub@CopperheadOS You agreed to support this open source project by building a business around it while explicitly agreeing that it would remain as an independent entity from the business without Copperhead directly owning or controlling it. You went back on your word and betrayed the project.
@_copperj@grufwub@CopperheadOS You hijacked the infrastructure and prevented the previous incarnation of the project from ever being able to release a legitimate update again. You stole the donations sent to support the development team and siphoned off the revenue earned based on leeching off the project.