If an app has the ability to perform arbitrary DNS queries via the OS, it can exfiltrate data to any party.

It can query encrypted-data.domain.tld to send data to an authoritative DNS server. No direct connection is ever required. It's being used in practice. Keep that in mind.
In general, granting network access provides the ability to exfiltrate data anywhere via the network. Fine-grained filtering is useful for harm reduction but doesn't provide what users expect from it. That includes using it in a stricter way than enumerating + blocking badness.
GrapheneOS has a coarse Network toggle blocking all direct access to the network and also preventing indirect access via APIs requiring the INTERNET permission.

Fine-grained filtering only filters direct access and there are a lot of issues like that DNS one. Doesn't work well.
Fingerprinting is also an issue. Web sites can enumerate what gets blocked.

If you're going to do DNS-based blocking, stick to a widely used filter set.

If you use a VPN, use their take or you'll stand out from others.

Sites can check your DNS server and enumerate filtering.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with GrapheneOS

GrapheneOS Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @GrapheneOS

3 Feb
If you receive legal threats from Copperhead based on their fraudulent claims of ownership over our work please get in touch with us.

There's no basis to these claims and we're looking into providing protection for contributors and other open source projects via indemnification.
CopperheadOS was started by Daniel Micay in 2014 and he owns all of the code he wrote for it. He's a co-founder of Copperhead and still owns half of the company. He never assigned any copyright to Copperhead and work on the project was not done as an employee or as contract work.
It was explicitly agreed upon that the open source project would remain owned and control by Daniel Micay. It was explicitly agreed upon that there would be no copyright assignment.

Copperhead is trying to intimidate contributors to GrapheneOS and other open source projects.
Read 5 tweets
1 Feb
We're hopeful the recent attention will help us with finding hardware partners with aligned goals.

It's a requirement for the devices to be at least as secure as a Pixel. That includes a modern mobile SoC and a comparable secure element to the Titan M implementing the same APIs.
Initially, it doesn't need to be better. It's difficult enough to produce a device meeting the same standards without severe privacy or security regressions. We're not interested in having our brand associated with a device that's marketed as private and secure but is worse off.
The setup we want to have isn't far from what Google was doing with Nexus devices. GrapheneOS needs substantial input into the design and implementation of devices. They'll use our signing keys for boot chain, stock OS verified boot key, etc.

Pixels set the baseline standards.
Read 5 tweets
4 Jan
GrapheneOS has funding available for developing an open source WebUSB-based installer as an alternative to our installation guide. It's low-level programming work despite being in JavaScript.

Get in touch with us (contact@grapheneos.org) if you're interested in working on it.
This does not involve designing and implementing a fancy user interface. It only needs the bare minimum of a functional interface for driving the installation process.

There's the open source fastboot code and an existing proprietary WebUSB-based flasher to reverse engineer.
Need to be comfortable with straightforward, fairly modern C++ and with JavaScript.

UX design and CSS are not within the scope of the project. Don't need to be concerned with making usable instructions either.

Goal for the project is a working installer with a bare minimum UI.
Read 8 tweets
31 Dec 20
The grapheneos.ca and grapheneos.net domains which were registered by Copperhead to cause harm to GrapheneOS should be turned over to us.

The same thing applies to the project's historical Twitter account which was stolen by social engineering Twitter support.
GrapheneOS was using the account before Copperhead existed. It's a separate account from the one belonging to the company and is still rightfully ours.

Our project was called CopperheadOS before Copperhead even existed. This is the same project as you can confirm via GitHub.
Legacy branches and tags from before renaming to AndroidHardening are published separately from the GrapheneOS namespace. The repositories are still the originals as shown by the network graph.

The issue tracker from before renaming the project is at github.com/AndroidHardeni….
Read 5 tweets
25 Dec 20
There's a new section in the GrapheneOS FAQ covering disk encryption:

grapheneos.org/faq#encryption

Other than GrapheneOS allowing ending user sessions and raising the padding size, this also applies to AOSP on devices with a secure element offering Weaver like the Pixel 2 and later.
This covers the baseline disk encryption.

Apps can use the hardware keystore API to provide another layer of encryption with options like setting keys to be only available when unlocked. Can also be mixed with their own encryption.

See github.com/mollyim/mollyi… for an example.
Before the Titan M introduced with the Pixel 3, the Pixel 2 used an off-the-shelf NXP security chip to implement Weaver. The implementation is open source:

android.googlesource.com/platform/exter…

It would be easy for other devices to implement. However, it's not mandatory so they don't bother.
Read 6 tweets
15 Dec 20
GrapheneOS is a non-profit open source project. It is not a company. It does not currently sell devices. It does not have an official device management app.

GrapheneOS has a team of developers working on it (github.com/orgs/GrapheneO…) led by @DanielMicay who started the project.
@DanielMicay There are companies and individuals selling devices with GrapheneOS. We aren't selling devices with GrapheneOS ourselves at this time. Some of these vendors install a bunch of additional apps and provide device management. We do not have our own official device management app.
For the most part, we're not receiving anything based on these companies selling devices. We're on good terms with @ncryptcellular and they're supporting the project. We're working towards being on good terms with a couple others. Others have been problematic and have harmed us.
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!