<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: gradeless</title><link>https://news.ycombinator.com/user?id=gradeless</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 20:50:15 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=gradeless" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by gradeless in "FSF announces Librephone project"]]></title><description><![CDATA[
<p>Yes it will take many years. This whole thing has already played out with FSF and Replicant. They ended up stuck working on a couple of ever aging devices as many new generations of devices were launched and all the technologies in smartphones evolved.<p>If people want open devices they should maybe better explore open hardware. Im not talking about devices, like Librem where the schematics are open but the chips, which are the parts which do all the work, are all closed, but rather devices with open silicon.</p>
]]></description><pubDate>Thu, 16 Oct 2025 22:45:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45611585</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45611585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45611585</guid></item><item><title><![CDATA[New comment by gradeless in "GrapheneOS is ready to break free from Pixels"]]></title><description><![CDATA[
<p>All android devices launched with android 15 or newer need to support Android Virtualization Framework. So there will be support for VMs.</p>
]]></description><pubDate>Wed, 15 Oct 2025 20:28:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=45597994</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45597994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45597994</guid></item><item><title><![CDATA[New comment by gradeless in "GrapheneOS is ready to break free from Pixels"]]></title><description><![CDATA[
<p>>GrapheneOS can not do anything about that.<p>GrapheneOS does not include any of the Google apps that implement Play Protect. You can install them, but they run in the sandbox like normal apps and so are not highly privileged. They are unable to block installation of apps, install apps or uninstall apps as they are on stock Androids</p>
]]></description><pubDate>Wed, 15 Oct 2025 20:04:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=45597702</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45597702</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45597702</guid></item><item><title><![CDATA[New comment by gradeless in "GrapheneOS is ready to break free from Pixels"]]></title><description><![CDATA[
<p>GrapheneOS recently added toggles to work around this
<a href="https://grapheneos.org/releases#2025100300" rel="nofollow">https://grapheneos.org/releases#2025100300</a></p>
]]></description><pubDate>Wed, 15 Oct 2025 19:44:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=45597452</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45597452</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45597452</guid></item><item><title><![CDATA[New comment by gradeless in "GrapheneOS is ready to break free from Pixels"]]></title><description><![CDATA[
<p>Rethink DNS app provides the ability to do that. Also can use it to connect to any Wireguard VPN and also monitor connections.<p>There are various apps that either connect directly to an IP address or do DNS resolution themselves to sidestep this kind of blocking. Rethink lets you stop apps making these kind of connections bypassing DNS and whatever DNS filtering you have set up to control their connections</p>
]]></description><pubDate>Wed, 15 Oct 2025 19:21:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=45597171</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45597171</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45597171</guid></item><item><title><![CDATA[New comment by gradeless in "GrapheneOS is ready to break free from Pixels"]]></title><description><![CDATA[
<p>What if you truly want the security properties provided by a device which can keep keys in a way where you fully control their use but its extremely hard for anyone to extract them?</p>
]]></description><pubDate>Wed, 15 Oct 2025 19:02:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=45596984</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45596984</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45596984</guid></item><item><title><![CDATA[New comment by gradeless in "Introduction to GrapheneOS"]]></title><description><![CDATA[
<p>Theres been a consistent pattern of both low quality and advanced malware looking for and targeting the weakness introduced by rooting a device.<p>Here is a recent report of widespread advanced malware looking to see if a device is rooted - <a href="https://www.lookout.com/threat-intelligence/article/badbazaar-surveillanceware-apt15" rel="nofollow">https://www.lookout.com/threat-intelligence/article/badbazaa...</a><p>Here is a report of malware using root -
<a href="https://zimperium.com/blog/new-advanced-android-malware-posing-as-system-update" rel="nofollow">https://zimperium.com/blog/new-advanced-android-malware-posi...</a><p>Root does not only provide  privilege escalation, it also provides attractive options for exploit persistence on a device, something which is difficult to achieve on modern Android and iOS.</p>
]]></description><pubDate>Tue, 16 Sep 2025 11:06:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=45260640</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=45260640</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45260640</guid></item><item><title><![CDATA[New comment by gradeless in "Experimental release of GrapheneOS for Pixel 9a"]]></title><description><![CDATA[
<p>Ive been using GrapheneOS for years and was in the chat rooms a fair bit, this isnt something common. Sounds like it may be hardware failing.<p>Having bootloader locked you get verified boot, big security benefits and automatic healing of operating system files damaged by the drive degrading.</p>
]]></description><pubDate>Sun, 13 Apr 2025 17:29:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=43674369</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=43674369</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43674369</guid></item><item><title><![CDATA[New comment by gradeless in "Experimental release of GrapheneOS for Pixel 9a"]]></title><description><![CDATA[
<p>Not sure if you've used GrapheneOS recently? If apps are heavily tied to Google Play Services you can install that and, in the vast majority of cases, get very good compatibility.<p>Compatibility with carriers also improved a lot a few years ago. Configurations for most carriers are pulled in from the stock Pixel OS. Some US carriers do weird things that depend upon having highly privileged apps bundled into the OS which, for security reasons, GrapheneOS doesnt include. I dont recall AT&T being one of them.<p>GrapheneOS is very usable and fine as a everyday phone for normal people.</p>
]]></description><pubDate>Sun, 13 Apr 2025 17:08:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=43674225</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=43674225</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43674225</guid></item><item><title><![CDATA[New comment by gradeless in "Pwning the all Google phone with a non-Google bug"]]></title><description><![CDATA[
<p>Or you couod look at using an android operating system which also supports bootloader relocking, but that doesnt have a history of repeated significant delays rolling out security patches <a href="https://privsec.dev/posts/android/choosing-your-android-based-operating-system/" rel="nofollow">https://privsec.dev/posts/android/choosing-your-android-base...</a></p>
]]></description><pubDate>Tue, 24 Jan 2023 14:10:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=34503732</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=34503732</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34503732</guid></item><item><title><![CDATA[New comment by gradeless in "Pwning the all Google phone with a non-Google bug"]]></title><description><![CDATA[
<p>Some apps suggest they use it when they dont. Some (most) apps use a weaker form which an android/AOSP operating system can comply with, without being registered with Google (licencing Play Services) see eg. <a href="https://grapheneos.org/usage#banking-apps" rel="nofollow">https://grapheneos.org/usage#banking-apps</a>
Very few apps use the full strict version of safetynet that requires hardware attestation</p>
]]></description><pubDate>Tue, 24 Jan 2023 00:52:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=34497500</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=34497500</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34497500</guid></item><item><title><![CDATA[New comment by gradeless in "Pwning the all Google phone with a non-Google bug"]]></title><description><![CDATA[
<p>It used to be the case that iphones were way ahead of security in android. With the efforts that have gone into improving things in the last few years and Google stepping up the quality of their hardware security with their Pixel lines that is no longer the case.
iPhones also have nasty (sometimes unpatchable) vulns. Android gets ever stronger protections against malicious apps, doesnt rely so much on Malware being screened from the store (malware regularly gets through onto both Play Store and Apples App Store)</p>
]]></description><pubDate>Mon, 23 Jan 2023 23:39:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=34496742</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=34496742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34496742</guid></item><item><title><![CDATA[New comment by gradeless in "Pwning the all Google phone with a non-Google bug"]]></title><description><![CDATA[
<p>The writeup of the bug states that it was patched in the January update for Pixels, which GrapheneOS has. But previous work on applying mali patches early led to GarpheneOS having a fix earlier than stock Pixels 
<a href="https://github.com/GrapheneOS/os-issue-tracker/issues/1914#issuecomment-1401114851">https://github.com/GrapheneOS/os-issue-tracker/issues/1914#i...</a></p>
]]></description><pubDate>Mon, 23 Jan 2023 23:11:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=34496441</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=34496441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34496441</guid></item><item><title><![CDATA[New comment by gradeless in "F-Droid – alternative to Google Play store"]]></title><description><![CDATA[
<p>While its likely Cellebrite make use of some known (and possibly some unknown) exploits to bypass the screen lock on some phone models and get at user data, sometimes they require the device to be unlocked and doubtlessly make use of adb to pull out user data.<p>Encryption on Android devices has changed over the last few years, introducing the possibility for File Based Encryption FBE, later making in mandatory.
File based encryption enables apps to use keys to encrypt their data that are flushed when the screen is locked. Many security concerned apps like password managers and OTP apps make use of this.<p>If you feel the need you can use 'multiple users' to create an extra user or use  a work profile (Island, Shelter, Insular) to keep sensitive apps and data. These have seperate encryption keys that are flushed upon switching off the work profile or restarting the phone (for multi user). You can still use the main user on the phone with the work profile/multi user encryption keys not held in memory.</p>
]]></description><pubDate>Wed, 02 Mar 2022 13:50:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=30527278</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=30527278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30527278</guid></item><item><title><![CDATA[New comment by gradeless in "F-Droid – alternative to Google Play store"]]></title><description><![CDATA[
<p>Theres a lot more to the android app sandbox than just running processes as seperate users. Theoretically something similar could be implemented in some other 'typical linux system'. It would be a huge undertaking. 
If you are thinking about security need to consider not only malicious apps, but possible attack vectors opened up by any application.
This paper is a couple of years old, it explains how it all works on Android <a href="https://arxiv.org/abs/1904.05572" rel="nofollow">https://arxiv.org/abs/1904.05572</a></p>
]]></description><pubDate>Wed, 02 Mar 2022 13:20:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=30527011</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=30527011</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30527011</guid></item><item><title><![CDATA[New comment by gradeless in "Secure Phone Series: Device Security"]]></title><description><![CDATA[
<p>There are endless launcher apps and icon packs you can get from F-Droid or elsewhere if you want to change the look of your phone.
AnySoftKeyboard is the keyboard on F-Droid with the most features</p>
]]></description><pubDate>Tue, 03 Nov 2020 21:30:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=24984235</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=24984235</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24984235</guid></item><item><title><![CDATA[New comment by gradeless in "Secure Phone Series: Device Security"]]></title><description><![CDATA[
<p>Magikeyboard is a function you enable in KeepassDX. Gives you an extra 'keyboard' you can switch to just for entering passwords. Stops other apps being able to swipe your passwords from your clipboard.</p>
]]></description><pubDate>Tue, 03 Nov 2020 21:17:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=24984091</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=24984091</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24984091</guid></item><item><title><![CDATA[New comment by gradeless in "Secure Phone Series: Device Security"]]></title><description><![CDATA[
<p>This is what CopperheadOS has become. Trading off the reputation they gained from before the split.<p>When they were still publishing their sources they were often lagging months behind with basic AOSP security updates. Still not updated to Android 11 yet, 2 months since it was launched, which,  as they support Pixels, means they now have 3 monthly updates worth of device specific security patches that can't of been applied.<p>GrapheneOS moved to 11 in September, not so long after it was released by Google</p>
]]></description><pubDate>Tue, 03 Nov 2020 21:11:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=24984034</link><dc:creator>gradeless</dc:creator><comments>https://news.ycombinator.com/item?id=24984034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24984034</guid></item></channel></rss>