We no longer have any active servers in France and are continuing the process of leaving OVH. We'll be rotating our TLS keys and Let's Encrypt account keys pinned via accounturi. DNSSEC keys may also be rotated. Our backups are encrypted and can remain on OVH for now.
Our App Store verifies the app store metadata with a cryptographic signature and downgrade protection along with verification of the packages. Android's package manager also has another layer of signature verification and downgrade protection.
Our System Updater verifies updates with a cryptographic signature and downgrade protection along with another layer of both in update_engine and a third layer of both via verified boot. Signing channel release channel names is planned too.
Our update mirrors are currently hosted on sponsored servers from ReliableSite (Los Angeles, Miami) and Tempest (London). London is a temporary location due to an emergency move from a provider which left the dedicated server business and will move. More sponsored update mirrors are coming.
Our ns1 anycast network is on Vultr and our ns2 anycast network is on BuyVM since both support BGP for announcing our own IP space. We're moving our main website/network servers used for default OS connections to a mix of Vultr+BuyVM locations.
We have 5 servers in Canada with OVH with more than static content and basic network services: email, Matrix, discussion forum, Mastodon and attestation. Our plan is to move these to Netcup root servers or a similar provider short term and then colocated servers in Toronto long term.
France isn't a safe country for open source privacy projects. They expect backdoors in encryption and for device access too. Secure devices and services are not going to be allowed. We don't feel safe using OVH for even a static website with servers in Canada/US via their Canada/US subsidiaries.
We were likely going to be able to release experimental Pixel 10 support very soon and it's getting disrupted. The attacks on our team with ongoing libel and harassment have escalated, raids on our chat rooms have escalated and more. It's rough right now and support is appreciated.
It's not possible for GrapheneOS to produce an update for French law enforcement to bypass brute force protection since it's implemented via the secure element (SE). SE also only accepts correctly signed firmware with a greater version AFTER the Owner user unlocks successfully.
We would have zero legal obligation to do it but it's not even possible. We have a list our official hardware requirements including secure element throttling for disk encryption key derivation (Weaver) combined with insider attack resistance. Why aren't they blaming Google?
In Canada and the US, refusing to provide a PIN/password is protected as part of the right to avoid incriminating yourself. In France, they've criminalized this part of the right to remain silent. Since they're criminalized not providing a PIN, why do they need anything from us?
@__tommyFR__ The initial articles consisted almost entirely of directly quoting law enforcement leadership in France including an interview with them. There was also paraphrasing of them which you could claim is inaccurate but there are plenty of direct quotes including a very direct threat.
@__tommyFR__ That was only the beginning. They've sent out a memo to police across France telling them to treat Pixel phones as highly suspicious and with more misinformation about GrapheneOS. They've made false and also unsubstantiated (almost certainly false) claims about GrapheneOS.
@OF24com @infogulch We plan to colocate the more sensitive stuff including our mail server in particular but we can move it to an non-OVH provider as a temporary bridge to that, potentially Netcup. Whole thing is a huge pain to do urgently. We were planning to move stuff long term but not quickly.
@dietzi96 One of their legacy data centers we didn't use for any production services burning down doesn't mean much. Amazon had serious fires at their DCs too and that's the premium option. In practice, AWS has also had plenty of downtime. OVH has been extremely reliable for us overall.
@PlugNTweet @artiomxxxiom @__tommyFR__ France has seized servers from companies selling secure devices. In a lot of the news coverage, they're quoted as very inaccurately comparing us to 2 of those companies (Encrochat and SkyECC). Why would we just let them hijack our website and other stuff which was still on OVH?
@PlugNTweet @artiomxxxiom @__tommyFR__ If people use either Private DNS or a VPN then they're benefiting from DNSSEC by trusting their provider to enforce it. That's not as good as enforcing is locally but it is getting enforced by a party they chose to trust to see their traffic. It's important beyond this though.
@PlugNTweet @artiomxxxiom @__tommyFR__ DNSSEC is enforced by most certificate authorities. We set Let's Encrypt as the only CA allowed to issue certificates via CAA and pin our per-server / per-server-cluster Let's Encrypt account keys via accounturi in CAA. This uses DNSSEC to properly secure certificate issuance.
@PlugNTweet @artiomxxxiom @__tommyFR__ We use TLS key pinning with the present and future Let's Encrypt roots along with backup leaf keys for our apps. It's not super useful for App Store and System Updater due to signing but it's still helpful. It's also used by our Auditor, Info and Network Location apps too.
@PlugNTweet @artiomxxxiom @__tommyFR__ TLS is what secures most of the connections. We pin the Let's Encrypt roots + our backup leaf keys for most of what's relevant. Securing the validation done by Let's Encrypt via CAA accounturi matters for securing TLS for all our users whether or not they have DNSSEC.
@PlugNTweet @artiomxxxiom @__tommyFR__ What you're suggesting does not provide them the ability to intercept connections which all use authenticated encryption via TLS. We use HSTS for everything too so users can't bypass the error in a browser. What would sending those IPs accomplish if it can't pass authentication?
@PlugNTweet @artiomxxxiom @__tommyFR__ What's the benefit to them of providing IPs which aren't going to be able to provide a valid certificate instead of simply blocking it with a server error? It's pretty much the same end result with a different error message. Blocking with a DNS resolution error is stealthier.
@PlugNTweet @artiomxxxiom @__tommyFR__ For our apps and several other things, we have the Let's Encrypt roots pinned so using another certificate authority is not going to work those. Certificate authorities are required to enforce CAA and supposed to enforce DNSSEC. Certificate Transparency is enforced by browsers.
@PlugNTweet @artiomxxxiom @__tommyFR__ We monitor certificate transparency logs for our domains for non-LE certificates. We can also audit to make sure all LE certificates were issued by audit but since we have accounturi pinning that implies compromising Let's Encrypt quite deeply, which is not really very likely.
@svr123456789 @dlandre The same goes for the US. They aren't trying to make what we do illegal and aren't trying to harm us or force us to include a backdoor. A list of countries which used to have the closest intelligence sharing with the US has little to do with us. France is a much bigger issue.
@ciaomiabelladia The vast majority of people who use the GrapheneOS code are good people and aren't using it to harm anyone. People use it protect themselves from rampant privacy invasion by corporations and states. GrapheneOS isn't a weapon but rather a defensive tool like ballistic glass.
@ciaomiabelladia Someone could use a car with ballistic glass to commit crimes. Do you think that's the responsibility of the car company and ballistic glass company? How are they supposed to control how people use their own car and why is it their responsibility to do so because of a protection?
• • •
Missing some Tweet in this thread? You can try to
force a refresh
GrapheneOS started in 2014 and was originally named CopperheadOS. In late 2015, the Copperhead company was founded which was meant to support the project. Copperhead didn't create CopperheadOS and didn't own or control it. Copperhead made a failed takeover attempt on it in 2018.
GrapheneOS still has the original CopperheadOS repositories on GitHub. Copperhead seized a bunch of the project's infrastructure and accounts. They created a closed source fork of GrapheneOS called CopperheadOS after the split which was not the same CopperheadOS as the original.
Copperhead remained entirely dependent on GrapheneOS and had to keep forking our code for each major Android update. Despite depending on GrapheneOS, they waged a war against it trying to destroy the project and attempting to ruin the lives of our team, especially our founder.
There are at least a dozen people spending at least several hours attacking GrapheneOS across platforms on a daily basis. It's a very strange situation. How do these people have so much time and dedication to keep making posts across platforms attacking us? It's relentless.
Every day, dozens of new accounts join our chat rooms to spread the same fabrications about GrapheneOS including via direct messages.
On Hacker News, one of the accounts making personal attacks based on fabrications in most threads about GrapheneOS has been doing it for 8 years.
Y Combinator (@ycombinator) has a financial stake in numerous surveillance and exploit development companies. Hacker News is a platform they own and the moderators on it have permitted years of vile harassment towards our team which they'd normally remove if others were targeted.
A false narrative is being pushed about GrapheneOS claiming we're ending operations in France due to the actions of 2 newspapers. That's completely wrong. If both newspapers and the overall French media had taken our side instead of extreme bias against us, we'd still be leaving.
We're ending operations in France and ending our use of French companies (mainly OVH) to provide services because of direct quotes by law enforcement in dozens of French news publications. Their inaccurate claims about GrapheneOS and thinly veiled threats were our sign to leave.
French law enforcement hijacked the servers of companies selling secure phones multiple times and is comparing us with those companies. They've made it clear they expect access to phones and will go after us if we do not cooperate. Cooperating with that means adding a backdoor.
The FBI ran a string operation in Europe where they created their own 'secure' phone and messaging platform. Their OS used portions of our code and was heavily marketed as being GrapheneOS or based on GrapheneOS.darknetdiaries.com/transcript/146/
Through this operation, the FBI provided criminals in Europe with a communication network they heavily trusted. It gave them much more confidence to coordinate and commit crimes. The vast majority of this crime was ignored for years to avoid exposing ANOM as being a honey pot.
In cooperation with many European governments, the FBI heavily encouraged and facilitated organized crime in Europe. US and European governments facilitated drug trafficking, human trafficking, murders, rape, kidnapping and much more for years while claiming it was GrapheneOS.
We were contacted by a journalist at Le Parisien newspaper with this prompt:
> I am preparing an article on the use of your secure personal data phone solution by drug traffickers and other criminals. Have you ever been contacted by the police? Are you aware that some of your clients might be criminals? And how does the company manage this issue?
Absolutely no further details were provided about what was being claimed, who was making it or the basis for those being made about it. We could only provide a very generic response to this.
Our response was heavily cut down and the references to human rights organizations, large tech companies and others using GrapheneOS weren't included. Our response was in English was translated by them: "we have no clients or customers" was turned into "nous n’avons ni clients ni usagers", etc...
GrapheneOS is a freely available open source privacy project. It's obtained from our website, not shady dealers in dark alleys and the "dark web". It doesn't have a marketing budget and we certainly aren't promoting it through unlisted YouTube channels and the other nonsense that's being claimed.
GrapheneOS has no such thing as the fake Snapchat feature that's described. What they're describing appears to be forks of GrapheneOS by shady companies infringing on our trademark. Those products may not even be truly based on GrapheneOS, similar to how ANOM used parts of it to pass it off as such.
France is an increasingly authoritarian country on the brink of it getting far worse. They're already very strong supporters of EU Chat Control. Their fascist law enforcement is clearly ahead of the game pushing outrageous false claims about open source privacy projects. None of it is substantiated.
iodéOS and /e/OS are based in France. iodéOS and /e/OS make devices dramatically more vulnerable while misleading users about privacy and security. These fake privacy products serve the interest of authoritarians rather than protecting people. /e/OS receives millions of euros in government funding.
Those lag many months to years behind on providing standard Android privacy and security patches. They heavily encourage users to use devices without working disk encryption and important security protections. Their users have their data up for grabs by apps, services and governments who want it.
There's a reason they're going after a legitimate privacy and security project developed outside of their jurisdiction rather than 2 companies based in France within their reach profiting from selling 'privacy' products.
There's another article posted at . We don't have a subscription to access it so we can't evaluate whether the coverage is fairer. Need our community to check. There's an ongoing attempt to smear GrapheneOS by French government agencies so there will be more articles.lefigaro.fr/secteur/high-t…
The reality is that a tiny proportion of the GrapheneOS userbase are criminals, clearly far below 1%. It's a rounding error. The vast majority of criminals use Android and iOS. French law enforcement contains a vastly higher proportion of criminals than the GrapheneOS userbase.
We published this response to a recent article promoting insecure devices with /e/OS with inaccurate claims, including inaccurate comparisons to GrapheneOS:
We made a post with accurate info on our forum in response to inaccurate information, that's all. There's a lot more we could have covered. See for several examples such as /e/OS having unique user tracking in their update client not communicated to users.kuketz-blog.de/e-datenschutzf…
The founder of /e/OS responded to the post we made on our forum here:
Gaël Duval has repeatedly personally targeted the founder of GrapheneOS in response to us posting accurate information responding to misinformation from /e/OS and their supporters.mastodon.social/@gael/11487468…