<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Andromxda</title><link>https://news.ycombinator.com/user?id=Andromxda</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 03 May 2026 09:52:09 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Andromxda" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by Andromxda in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>They're partnering with Motorola to build devices with official GrapheneOS support. <a href="https://grapheneos.social/@GrapheneOS/116159602850585685" rel="nofollow">https://grapheneos.social/@GrapheneOS/116159602850585685</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 19:02:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47952840</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47952840</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47952840</guid></item><item><title><![CDATA[New comment by Andromxda in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>It's open source [1], and they're pretty transparent about everything. You can ask the devs anything, and they will probably give you a really useful and informative answer. They have extensive documentation, and they're pretty open, even about stuff like their servers [2], configurations [3], everything.<p>[1] <a href="https://grapheneos.org/source" rel="nofollow">https://grapheneos.org/source</a><p>[2] <a href="https://grapheneos.org/articles/grapheneos-servers" rel="nofollow">https://grapheneos.org/articles/grapheneos-servers</a><p>[3] <a href="https://github.com/GrapheneOS/infrastructure" rel="nofollow">https://github.com/GrapheneOS/infrastructure</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 19:01:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47952826</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47952826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47952826</guid></item><item><title><![CDATA[New comment by Andromxda in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>If you want an outdated, insecure, and extremely overpriced phone, sure, go ahead.<p>It's literally 2018 hardware being sold for 800 bucks. 3 GB of RAM? Seriously? The iPhone XS, also from 2018, has 4 GB of RAM, just saying.<p>And regarding the security: <a href="https://madaidans-insecurities.github.io/linux-phones.html" rel="nofollow">https://madaidans-insecurities.github.io/linux-phones.html</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 18:45:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47952616</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47952616</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47952616</guid></item><item><title><![CDATA[New comment by Andromxda in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>That's perhaps because typical consumers don't build their own operating systems?</p>
]]></description><pubDate>Wed, 29 Apr 2026 18:37:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47952511</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47952511</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47952511</guid></item><item><title><![CDATA[New comment by Andromxda in "Your phone is about to stop being yours"]]></title><description><![CDATA[
<p>They're insecure [1] and far from usable.<p>[1] <a href="https://madaidans-insecurities.github.io/linux-phones.html" rel="nofollow">https://madaidans-insecurities.github.io/linux-phones.html</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 18:33:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47952469</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47952469</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47952469</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>Of course the topic as a whole is much more complex than that, but I'll try to summarize it. Android has 3 systems of access control [1][2]:<p>- Discretionary Access Control, i.e. the standard Unix file permissions<p>- Mandatory Access Control, implemented in the form of the SELinux and YAMA LSMs (GrapheneOS stopped using YAMA in the 2024031400 release and replaced it with advanced SELinux policies)<p>- Android permissions which have to be disclosed in the AndroidManifest.xml, and most of the time need to be granted by the user at runtime<p>Root simply bypasses ALL of these security mechanisms. This is a clear violation of the principle of least privilege, since most of the stuff you are doing with root probably doesn't require access to your entire filesystem, and could easily run within an SELinux context. But writing and deploying a modified SELinux policy would take extra time and effort, and devs are lazy, so they just use root to completely bypass it.<p>As madaidan points out, only a tiny subset of system processes on Android run as root. [3] And Android has clear guidelines about what root process are and aren't allowed to do. From the AOSP documentation:<p>> Where possible, root code should be isolated from untrusted data and accessed via IPC.<p>> Root processes must not listen on a network socket.<p>> Root processes must not provide a general-purpose runtime for apps (for example, a Java VM).<p>Desktop systems are very different from Android and iOS. Out of Android's three major security mechanisms, they typically only implement one. This is why ransomware is so insanely successful. Every program has access to all the files and folders of the logged in user, including network shares, etc. Even on systems that implement application sandboxing and a permission system, such as macOS, it's only an afterthought, and isn't enforced properly. (macOS is still miles ahead of Windows and Linux though) For example, when installing a 3rd-party terminal emulator such as iTerm2 on macOS, you have to grant it the permission to access your entire file system (otherwise you will be limited to the home directory IIRC). But this permission also applies recursively to every process started within the terminal, greatly limiting its usefulness.<p>> I don't understand this. Could someone explain it with more details to me, please?<p>Android uses Verified Boot to protect against both Evil maid attacks [4], i.e. someone modifying the operating system on the hard drive, and malware persistence. By default, the Android /system partition is mounted in read-only mode, unlike for example your C:\Windows directory, or system directories like /bin on Linux. This prevents malware from modifying the operating system. If you ever get malware on Android or iOS, in most cases you can get rid of it, by simply rebooting your device. Unless of course, the malware has some persistence mechanism. Root obviously provides a great vector for persistence, since the system partition could simply be remounted in a writable mode, and the system could be modified however the attacker wants to.<p>When you build your own copy of AOSP or GrapheneOS, include your modifications, and sign the image with your own Verified Boot keys, that image can't be modified or tampered with by an attacker. It's perfectly secure to do that (of course only if you can trust the extra code you're including).<p>[1] <a href="https://source.android.com/docs/security/app-sandbox#protections" rel="nofollow">https://source.android.com/docs/security/app-sandbox#protect...</a><p>[2] <a href="https://arxiv.org/pdf/1904.05572" rel="nofollow">https://arxiv.org/pdf/1904.05572</a><p>[3] <a href="https://source.android.com/docs/security/overview/implement#root-processes" rel="nofollow">https://source.android.com/docs/security/overview/implement#...</a><p>[4] <a href="https://en.wikipedia.org/wiki/Evil_maid_attack" rel="nofollow">https://en.wikipedia.org/wiki/Evil_maid_attack</a></p>
]]></description><pubDate>Thu, 05 Mar 2026 22:31:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47268198</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47268198</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47268198</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>No, this is incorrect. The GrapheneOS NetworkLocation client (<a href="https://github.com/GrapheneOS/platform_packages_apps_NetworkLocation" rel="nofollow">https://github.com/GrapheneOS/platform_packages_apps_Network...</a>) is using Apple's request format and performing the calculations locally, similar to how it's done on iPhones. The proxy is just an entry in the nginx config: <a href="https://github.com/GrapheneOS/grapheneos.org/blob/main/nginx/nginx.conf#L874-L909" rel="nofollow">https://github.com/GrapheneOS/grapheneos.org/blob/main/nginx...</a><p>The data is cached for roughly 15 minutes. <a href="https://grapheneos.org/features#:~:text=It%20caches%20the%20information%20from%20the%20service%20in%2Dmemory%20for%20up%20to%2015%20minutes%20from%20when%20it%20was%20last%20used%20so%20it%20can%20function%20offline%20after%20getting%20the%20initial%20data." rel="nofollow">https://grapheneos.org/features#:~:text=It%20caches%20the%20...</a><p>GrapheneOS plans to scrape Apple's database and make it downloadable, so Wi-fi positioning could be done fully locally.</p>
]]></description><pubDate>Thu, 05 Mar 2026 06:41:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47258341</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47258341</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47258341</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>Rooting is a very bad idea. <a href="https://madaidans-insecurities.github.io/android.html#rooting" rel="nofollow">https://madaidans-insecurities.github.io/android.html#rootin...</a> But GrapheneOS is fully open source and provides great build instructions, so you can always make your own build and add whatever features or privileged apps you like within the standard AOSP frameworks for privileged apps with system integration.<p>> Backing up all app data via Neo Backup<p>GrapheneOS includes Seedvault by default. <a href="https://grapheneos.org/features#encrypted-backups" rel="nofollow">https://grapheneos.org/features#encrypted-backups</a><p>> High-quality call recording via Call Recorder<p>Call recording is built into the Dialer app on GrapheneOS. <a href="https://grapheneos.org/features#encrypted-backups:~:text=Call%20recording%20functionality%20within%20the%20Dialer%20app%20using%20modern%20Android%20storage%20with%20recordings%20stored%20in%20Recordings/Call%20Recordings%20and%20no%20restrictions%20based%20on%20region%20or%20special%20cases%20like%20playing%20a%20recording%20tone%20(users%20are%20still%20responsible%20for%20complying%20with%20their%20local%20laws)" rel="nofollow">https://grapheneos.org/features#encrypted-backups:~:text=Cal...</a>.<p>> DNS-based ad blocking is possible via apps like AdGuard<p>DNS-based blocking can also be accomplished by using Android's native Private DNS feature with a resolver that blocks ads. You could even host your own on a VPS if you are more comfortable running name resolution and DNS-level adblocking on infrastructure you control.<p>The RethinkDNS app also lets you use DNS-level adblocking and a VPN at the same time. <a href="https://grapheneos.org/faq#ad-blocking-apps" rel="nofollow">https://grapheneos.org/faq#ad-blocking-apps</a><p>> I have no experience with GrapheneOS, so I'd be interested to hear if these features are possible on it without rooting.<p>I recommend giving <a href="https://grapheneos.org/features" rel="nofollow">https://grapheneos.org/features</a> a read.<p>> If not, can I request these features somewhere?<p>Check out the issue tracker on GitHub: <a href="https://github.com/GrapheneOS/os-issue-tracker/issues" rel="nofollow">https://github.com/GrapheneOS/os-issue-tracker/issues</a></p>
]]></description><pubDate>Wed, 04 Mar 2026 20:31:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47253384</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47253384</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47253384</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>and CAN'T link the location information to any other data</p>
]]></description><pubDate>Wed, 04 Mar 2026 20:12:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47253138</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47253138</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47253138</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>Definitely wouldn't be unheard of in the Fintech industry. But I don't know, because I don't use the service. My bank thankfully offers their own implementation of NFC payments within their own app, so I don't need to rely on any third-party services. Many banks in Europe actually do this. Here's a German article about Google-free mobile payments on GrapheneOS: <a href="https://www.kuketz-blog.de/nfc-datenschutzfreundlich-bezahlen-mit-dem-android-phone/" rel="nofollow">https://www.kuketz-blog.de/nfc-datenschutzfreundlich-bezahle...</a></p>
]]></description><pubDate>Tue, 03 Mar 2026 07:18:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47229209</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47229209</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47229209</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>> you can inspect the code it's running<p>That's only true for microG itself, not the Google blobs it needs to download and execute in order to function.
GmsCompat on GrapheneOS is also fully open source.[1]<p>> For example you can replace the location service with a privacy respecting one.<p>GrapheneOS literally does that.[2] It's currently not perfect in regard to privacy because they are using Apple's Wi-Fi positioning service, but proxying it through their own servers, so Apple never gets the user's IP address or any unique identifiers, and link the location information to any other data. One thing Apple currently does better than most network location providers is the fact that they don't just return position data for one BSSID, they actually give you the data for hundreds of nearby BSSIDs as well[3], which is more private, and means that much fewer requests need to be made to the service.<p>Because of this aforementioned aspect, Apple's Wi-Fi positioning system is also incredibly easy to scrape. GrapheneOS plans to build their own database, and let users download it, so Wi-Fi positioning could be performed fully locally.<p>> It would be amazing if grapheneos would support microG as an option. But they are too much "not invented here" for that to happen.<p>GrapheneOS doesn't support microG, because it has worse app compatibility than Sandboxed Google Play, and requires elevated privileges, unlike SGP.<p>[1] <a href="https://github.com/GrapheneOS/platform_packages_apps_GmsCompat" rel="nofollow">https://github.com/GrapheneOS/platform_packages_apps_GmsComp...</a><p>[2] <a href="https://grapheneos.org/features#network-location" rel="nofollow">https://grapheneos.org/features#network-location</a><p>[3] <a href="https://github.com/acheong08/apple-corelocation-experiments" rel="nofollow">https://github.com/acheong08/apple-corelocation-experiments</a></p>
]]></description><pubDate>Tue, 03 Mar 2026 07:12:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47229169</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47229169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47229169</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>GrapheneOS doesn't support face unlocking right now, but they have a useful two-factor unlock option that requires both a PIN, and biometrics (currently a fingerprint on Pixel devices) to unlock the device while in AFU. It also allows you at the same time to use a long passphrase in BFU.</p>
]]></description><pubDate>Mon, 02 Mar 2026 21:07:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47224083</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47224083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47224083</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>> Graphene IIRC keeps a compatibility list somewhere.<p>This is the community-maintained banking app compatibility list: <a href="https://privsec.dev/posts/android/banking-applications-compatibility-with-grapheneos/" rel="nofollow">https://privsec.dev/posts/android/banking-applications-compa...</a></p>
]]></description><pubDate>Mon, 02 Mar 2026 21:03:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47224032</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47224032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47224032</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>> Curve Pay refused to give me an account on my Murena FP6<p>That's probably because /e/OS uses microG, which is vastly inferior to Sandboxed Google Play on GrapheneOS, and has much worse app compatibility.
You should also know that /e/OS is a highly insecure OS, and both Fairphone and Murena are constantly misleading their customers with false marketing and false promises.</p>
]]></description><pubDate>Mon, 02 Mar 2026 19:37:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47222994</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47222994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47222994</guid></item><item><title><![CDATA[New comment by Andromxda in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>> Are you sure about this? It was my understanding that NFC passes for gyms and stuff worked<p>This is only true for Google Wallet. It can be used as a normal wallet app for stuff like plane tickets, etc., but Google Pay requires the OS to be specifically whitelisted by Google. This is an incredibly anti-competitive move aimed at supporting Google's monopoly by deliberately disabling functionality on alternative (including much more secure) operating systems like GrapheneOS under the guise of security.<p>Curve Pay works fine on GrapheneOS, there's even an article by a community member talking about it: <a href="https://shkspr.mobi/blog/2025/06/contactless-payments-with-grapheneos/" rel="nofollow">https://shkspr.mobi/blog/2025/06/contactless-payments-with-g...</a></p>
]]></description><pubDate>Mon, 02 Mar 2026 14:57:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47218788</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47218788</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47218788</guid></item><item><title><![CDATA[New comment by Andromxda in "GrapheneOS – Break Free from Google and Apple"]]></title><description><![CDATA[
<p>Starling Bank has been officially supporting GrapheneOS using Android's hardware attestation API (not the Play Integrity API) since 2024.</p>
]]></description><pubDate>Wed, 18 Feb 2026 15:11:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47061810</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47061810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47061810</guid></item><item><title><![CDATA[New comment by Andromxda in "GrapheneOS – Break Free from Google and Apple"]]></title><description><![CDATA[
<p>Starling Bank has been officially supporting GrapheneOS using Android's hardware attestation API (not the Play Integrity API) since 2024.</p>
]]></description><pubDate>Wed, 18 Feb 2026 15:10:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47061804</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47061804</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47061804</guid></item><item><title><![CDATA[New comment by Andromxda in "GrapheneOS – Break Free from Google and Apple"]]></title><description><![CDATA[
<p>There are several banks, especially over here in Europe, that have their own implementations of contactless payments, if that's what you mean. Here's a German article outlining this and mentioning a few examples: <a href="https://www.kuketz-blog.de/nfc-datenschutzfreundlich-bezahlen-mit-dem-android-phone/" rel="nofollow">https://www.kuketz-blog.de/nfc-datenschutzfreundlich-bezahle...</a></p>
]]></description><pubDate>Tue, 17 Feb 2026 21:34:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47053707</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=47053707</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47053707</guid></item><item><title><![CDATA[GrapheneOS bails on OVHcloud over France's privacy stance]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.theregister.com/2025/11/28/grapheneos_ovhcloud/">https://www.theregister.com/2025/11/28/grapheneos_ovhcloud/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46083508">https://news.ycombinator.com/item?id=46083508</a></p>
<p>Points: 9</p>
<p># Comments: 2</p>
]]></description><pubDate>Fri, 28 Nov 2025 22:51:40 +0000</pubDate><link>https://www.theregister.com/2025/11/28/grapheneos_ovhcloud/</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=46083508</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46083508</guid></item><item><title><![CDATA[New comment by Andromxda in "Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking"]]></title><description><![CDATA[
<p>It's totally possible that there will be an option to buy the device with GrapheneOS preinstalled <a href="https://grapheneos.social/@GrapheneOS/114749924008111970" rel="nofollow">https://grapheneos.social/@GrapheneOS/114749924008111970</a></p>
]]></description><pubDate>Tue, 04 Nov 2025 20:47:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=45815701</link><dc:creator>Andromxda</dc:creator><comments>https://news.ycombinator.com/item?id=45815701</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45815701</guid></item></channel></rss>