<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ysnp</title><link>https://news.ycombinator.com/user?id=ysnp</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 03 May 2026 08:33:20 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ysnp" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ysnp in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>From what I've read I understand it is more like:<p>/e/OS (recipient of EU funding) and iodéOS are European projects that have <i>not</i> been singled out by the French government in smearing despite them having the similar self-professed goals to GrapheneOS. That they had any influence at all on the French government directly is speculated but not asserted.<p>CalyxOS/Techlore are blamed for being complicit in escalating the animosity and furore around what were initially low-key fallouts/disagreements. This led to GrapheneOS/Micay escalating to defend themselves which unchecked fuelled a spiral of influencer content, vile spamming of CSAM in GrapheneOS rooms (I can personally attest these were some of the biggest on Matrix at the time and led to the team giving up on Matrix moderation and self-protection capabilities), intense public speculation/accusations about Micay's character/mental health etc. which eventually resulted in the swatting attempts.<p>F-Droid project members have publicly aired their dislike of Daniel as a result of direct or indirect disagreements and did have a software quirk that caused an issue for GrapheneOS/possibly other custom OSes' users due to their added permission (which the two parties again disagreed on). Conspires is loaded wording.<p>But I do not think it is productive for me to dredge up posts and potentially cause more misunderstandings as a complete outsider for something that is directly affecting someone's life like this. They (Micay/GrapheneOS) have posted detailed contextual snippets and information about what has happened so please contact them directly for reference to the original posts and discuss if you really wish to find out more.</p>
]]></description><pubDate>Wed, 22 Apr 2026 05:57:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47859617</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47859617</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47859617</guid></item><item><title><![CDATA[New comment by ysnp in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>There are a lot of judgemental comments here criticising Daniel's character, responses and handling of what was likely a very trying and stressful period in their life.<p>Barely any comments about the linked thread which is about Wired publishing an article that was extremely poorly researched after having misled GrapheneOS about the intention and content of what would be published. This seems like the sort of thing that should earn a disclaimer on future Wired articles as worthless and get them removed from RSS feeds/have subscriptions cancelled. Complete lack of integrity and respect for standards. Why did they not interview anyone else involved in the project or around at the time?</p>
]]></description><pubDate>Tue, 21 Apr 2026 20:07:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47853865</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47853865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47853865</guid></item><item><title><![CDATA[New comment by ysnp in "Original GrapheneOS responses to WIRED fact checker"]]></title><description><![CDATA[
<p>Phantom Secure is directly named as one of the parties Donaldson was dealing with, with others being suspected:<p>><i>Donaldson tried to make a deal with Phantom Secure, which ultimately didnt work out. Micay suspected other counterparties were linked to organized crime, but we cannot confirm those identities or ties on short notice. Donaldson began pursuing such deals before Micay left and continued afterward.</i><p><a href="https://discuss.grapheneos.org/d/34369-original-grapheneos-responses-to-wired-fact-checker" rel="nofollow">https://discuss.grapheneos.org/d/34369-original-grapheneos-r...</a></p>
]]></description><pubDate>Tue, 21 Apr 2026 17:55:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47852125</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47852125</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47852125</guid></item><item><title><![CDATA[New comment by ysnp in "Android Developer Verification"]]></title><description><![CDATA[
<p>It may be worth checking Motorola's OLED models in person (for example the Razr Fold, Razr Ultra and Signature) so see if their Flicker Prevention mode helps. I don't think any IPS models are likely to be supported in the first wave/generation of supported devices in 2027.</p>
]]></description><pubDate>Tue, 31 Mar 2026 17:29:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47590738</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47590738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47590738</guid></item><item><title><![CDATA[New comment by ysnp in "Android Developer Verification"]]></title><description><![CDATA[
<p>Having GrapheneOS preinstalled is an option they may discuss with Motorola. It is not the current plan. The current plan is that Motorola release their devices as normal, but some of the flagship devices in 2027 will support manual installation of GrapheneOS.</p>
]]></description><pubDate>Tue, 31 Mar 2026 17:19:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47590590</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47590590</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47590590</guid></item><item><title><![CDATA[New comment by ysnp in "Google details new 24-hour process to sideload unverified Android apps"]]></title><description><![CDATA[
<p>GrapheneOS will support future Morotola phones that meet a subset of their requirements, rather than existing phones. Less likely to be budget lines for now.</p>
]]></description><pubDate>Fri, 20 Mar 2026 04:06:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47450360</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47450360</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47450360</guid></item><item><title><![CDATA[New comment by ysnp in "Cert Authorities Check for DNSSEC from Today"]]></title><description><![CDATA[
<p>DNSSEC is one of very few topics where voices I respect on security seem completely opposed (WebPKI depends on DNS vs. DNS security does not matter). Is there any literature that demonstrates deep understanding of both arguments? Why are they (DNSSEC + WebPKI) never considered complimentary?</p>
]]></description><pubDate>Mon, 16 Mar 2026 18:16:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47402682</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47402682</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47402682</guid></item><item><title><![CDATA[New comment by ysnp in "Xous security focused open source on 22nm custom silicon"]]></title><description><![CDATA[
<p>Is the case that captures all RF still planned for the productised Baochip?</p>
]]></description><pubDate>Fri, 06 Mar 2026 20:38:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47280776</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47280776</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47280776</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>Can anyone from Motorola confirm that the form submission and time delay requirements will be removed?</p>
]]></description><pubDate>Wed, 04 Mar 2026 20:10:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47253119</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47253119</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47253119</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>Hi daneel, what would you like GrapheneOS to do while you develop your own formally verified, open hardware, open source firmware/OS baseband processor they can use? Sit on their hands doing nothing or making the best of the least worst options currently available?</p>
]]></description><pubDate>Wed, 04 Mar 2026 20:03:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47253033</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47253033</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47253033</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>Since ~2023 all Motorola phones with Snapdragon SoCs (the ones most likely to support MTE as needed by GrapheneOS first) have been larger or equal to 6.5" screens.</p>
]]></description><pubDate>Wed, 04 Mar 2026 19:51:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47252885</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47252885</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47252885</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola GrapheneOS devices will be bootloader unlockable/relockable"]]></title><description><![CDATA[
<p>The Google Pixel has first-class support for alternate OSes (not custom firmware like a Chromebook). The OEM has to go out of their way to support avb_custom_key as mentioned in <a href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later" rel="nofollow">https://android.googlesource.com/platform/external/avb/+/mas...</a> and I believe the GrapheneOS founder strcat was heavily involved in helping Google design this feature and flow for Android Verified Boot.</p>
]]></description><pubDate>Wed, 04 Mar 2026 19:45:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47252804</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47252804</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47252804</guid></item><item><title><![CDATA[New comment by ysnp in "/e/OS is a complete, fully “deGoogled” mobile ecosystem"]]></title><description><![CDATA[
<p>><i>are by incompetent/lazy/pressured devs who just throw in some library and don't even care that it leaks data to Google</i><p>Even if I agreed with this statement, I don't understand why it is better to put limited/precious resources something the app developers can easily circumvent, praying they never stop being incompetent/lazy/pressured and tell device owners it is an important privacy feature? Instead of waiting for the apps to become actively hostile why not just feed them fake data in the first place? Like the scoped access permissions do?<p>If you really want to do this, you (and any GrapheneOS user) can do it today with mitmproxy and RethinkDNS but I think it is perfectly OK users choose their (privacy-invasive) apps and choose how to mitigate annoyances like that themselves. Otherwise they need to complain to the app developers and app stores.<p>><i>That's why I said that the main focus of GOS is security, not privacy. If they cared about privacy primarily, they would actively support microG and NetGuard, or at least similar solutions.</i><p>That feels more like you are framing your opinion as a fact. To me it is not so obvious.<p>When I think of privacy, I think of Privacy Enhancing Technologies (<a href="https://petsymposium.org/" rel="nofollow">https://petsymposium.org/</a>). I also think of things like:<p>* separate network namespaces for profiles (<a href="https://github.com/GrapheneOS/os-issue-tracker/issues/5225#issuecomment-2799038011" rel="nofollow">https://github.com/GrapheneOS/os-issue-tracker/issues/5225#i...</a>) and/or a GrapheneOS-Gateway equivalent to <a href="https://www.whonix.org/wiki/Whonix-Gateway" rel="nofollow">https://www.whonix.org/wiki/Whonix-Gateway</a>, 
* built-in OS support for chaining VPNs together or splitting different traffic over different privacy-enhanced networks like in RethinkDNS, 
* adversarial pressure wave + ultrasonic noise to thwart smart listening devices <a href="https://youtu.be/xMYm2d9bmEA?t=1305" rel="nofollow">https://youtu.be/xMYm2d9bmEA?t=1305</a>, 
* virtualisation as a sandboxing and anti-fingerprinting primitive (<a href="https://discuss.grapheneos.org/d/5775-device-fingerprinting-test-results-concerns-and-questions/20" rel="nofollow">https://discuss.grapheneos.org/d/5775-device-fingerprinting-...</a>), 
* control over what apps can communicate with each other <a href="https://github.com/GrapheneOS/os-issue-tracker/issues/2197" rel="nofollow">https://github.com/GrapheneOS/os-issue-tracker/issues/2197</a>
* location scopes/phone state scopes etc that are already planned.<p>etc.</p>
]]></description><pubDate>Tue, 03 Mar 2026 19:09:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47237202</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47237202</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47237202</guid></item><item><title><![CDATA[New comment by ysnp in "iPhone 17e"]]></title><description><![CDATA[
<p>The partnership is for future devices, rather than existing devices.</p>
]]></description><pubDate>Tue, 03 Mar 2026 17:25:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47235665</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47235665</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47235665</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>They said they have access to security previews/patches but I have missed that they have full AOSP access now? Do you have a link?</p>
]]></description><pubDate>Mon, 02 Mar 2026 19:31:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47222913</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47222913</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47222913</guid></item><item><title><![CDATA[New comment by ysnp in "/e/OS is a complete, fully “deGoogled” mobile ecosystem"]]></title><description><![CDATA[
<p>I am not a project member so I cannot speak for GrapheneOS, but maybe I can help clear up some misunderstandings.<p>><i>insistence on not supporting MicroG leads to poor UX,</i><p>The problem they are trying to solve is apps not working without the presence of Google Mobile Services or Google Play. They don't want to compromise by having a component with high privileges integrated in their image that involves security issues like signature spoofing.<p>MicroG will send less data to Google partly because it is simply an incomplete implementation of the features offered by GMS (sanboxed-google-play appp compatibility is quite a bit higher), partly because the access is more granular or there are choices offered for services like location (GrapheneOS provides non-Google location services and community support on only installing and enabling the parts you need for specific app features to work). UX is not adversely affected, but if you want to use a privileged app bypassing security checks and sending data to Google anyway then you have the freedom to compile microG with it integrated if you would like.<p>><i>They also seem to be very opinionated about (not) using a firewall for privacy, like NetGuard, instead recommending some weird alternatives like DNS firewalls</i><p>GrapheneOS tries to implement or end encourage sustainable approaches to privacy and security, and this partially means approaches that don't break if the adversary knows what you are doing.<p>Egress/outbound traffic filtering is fundamentally unworkable. Apps do not have to connect to known privacy a invasive third party domains to violate your privacy or expose your data to extra parties, they can simply send anything they want to their own servers and do anything they like with the data. From my understanding this is why GrapheneOS do not want to encourage the approach of blocking apps from connecting to certain domains/addresses.<p>Instead they tackle the problem at its source by providing a direct AND indirect network access toggle which cuts off an apps access to the outernet without letting the app know (pretends the network is down). This makes it non trivial for apps to exfiltrate data and as a side effect can provide benefits like data conservation (for capped plans).<p>><i>instead recommending some weird alternatives like DNS firewalls.</i><p>DNS based solutions are offered (not promoted) if you want more control over your DNS query resolvers or you want to improve your quality of experience by blocking advertisements and malvertising domains.<p>><i>they (heavily) prioritize security over privacy.</i><p>Can you point out another OS project with real privacy features like a network permission, sensors data access permission, contact access scopes, storage access scopes, per connection MAC randomisation and so on? <a href="https://eylenburg.github.io/android_comparison.htm" rel="nofollow">https://eylenburg.github.io/android_comparison.htm</a> They have even more plans for privacy like location scopes, anti-fingerprinting for Vanadium browser and maybe AnonymisedDNSCrypt/Oblivious DNS and probably more they haven't mentioned. If you suggest some more on their issue tracker they may get back to it when they have the resources.</p>
]]></description><pubDate>Mon, 02 Mar 2026 19:09:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47222574</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47222574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47222574</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>It took a while but congrats to Daniel Micay and GrapheneOS. Hopefully it is the first of a few (looking at you HMD, Sony, Samsung, Nothing).<p>Will Motorola allowlist/whitelist GrapheneOS's avb key for green boot state? Does that have any implications for Play Integrity?<p>Do GrapheneOS finally get AOSP full partner access as a result of this? Will the Motorola device have USB port control, OS virtualisation and GPU virtualisation? Will it have a better secure face unlock story than Pixel 5 - 10?<p>Will the gushing fans and secret admirers finally stop flocking to me because I switched from Pixel-GrapheneOS to Motorola-GrapheneOS?</p>
]]></description><pubDate>Mon, 02 Mar 2026 18:04:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47221632</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47221632</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47221632</guid></item><item><title><![CDATA[New comment by ysnp in "Motorola announces a partnership with GrapheneOS"]]></title><description><![CDATA[
<p>><i>some odd ideas about trust and PKIs.</i><p>Can you explain what you mean?</p>
]]></description><pubDate>Mon, 02 Mar 2026 17:37:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47221216</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47221216</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47221216</guid></item><item><title><![CDATA[New comment by ysnp in "F-Droid Board of Directors nominations 2026"]]></title><description><![CDATA[
<p>><i>I've had people tell me that nobody should use anything but GrapheneOS and stop supporting alternatives to throw all support into that because the others are "less secure"</i><p>Without having an kind of authoritative knowledge or experience on the topic, those people are wrong and please ignore them. The argument has generally been that if you are specifically after privacy and security in your personal device then GrapheneOS or post-MIE iOS will be your most sensible choices. You CAN choose devices for other reasons, as has always been your prerogative.<p>The question of whether to support 'alternatives' is fraught. It used to be that there were two other OS projects that happened to be collaborating and adopting features from GrapheneOS and that would have been reasonable. The main argument (from GrapheneOS) in that case has been for people to please invest in alternatives with approaches to privacy and security that stand up to threat-model driven design and real world attacker/defender experience.<p>GrapheneOS was never meant to be alone in pushing for things like hardened secure element-based protection of secrets and side-channel resistant rate-limiting of unlock attempts, memory tagging/hardened memory allocators/secure application spawning/dynamic code loading control, anti-persistence hardening, prompt security patching, network/sensor permissions, contact/storage scopes, PIN scrambling, auto reboot etc. Unfortunately very few other projects that I am aware of are looking into doing things like this to give the device owner control and mastery over their data.<p>><i>and now that GrapheneOS isn't for everyone and anyone -- the majority of people -- without a specific narrow selection of hardware should get lost.</i><p>GrapheneOS tries to make most of their hardening transparent and non-intrusive by default. They also spend a lot of time and resources working on usability (sandboxed-Google-play and the web installer) and now accessibility (upcoming text-to-speech implementation?). The idea is that if you have a Pixel and choose to use GrapheneOS then it should be as easy to use as they can manage without compromising their efforts improving privacy/security. In that sense, GrapheneOS is for anyone and not just security nerds or tinfoil hats.<p>The exclusivity to Pixels is an unfortunate consequence of being the only platform equipped to provide what they need to achieve their goals. If multiple devices supported what they needed from the beginning, they would have probably supported three or four models from different brands as targets (for example you could imagine a couple Pixel lines + one Samsung line (Europe/North America/Oceania), one Xiaomi line (East Asia/South East Asia/South Asia/South America), one Tecno line (Africa). This is speculation on my part, but the main point is that the Android OEMs have been seriously slacking on basic privacy/security leading to this kind of situation.<p>><i>We need the people who buy $100 phones to have the ability to put a better OS on them than the burning mudslide that comes with them, is all I'm saying.</i><p>No disagreement here. This relies on AOSP adopting improvements and also on Google tightening their certification (for Play Store) requirements to include stronger privacy and security guarantees.</p>
]]></description><pubDate>Sat, 28 Feb 2026 07:40:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47191786</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47191786</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47191786</guid></item><item><title><![CDATA[New comment by ysnp in "F-Droid Board of Directors nominations 2026"]]></title><description><![CDATA[
<p>The point of GrapheneOS isn't improving a generic device's security, it's about setting an example for a highly private and secure OS. It's a FOSS project, so nothing stops a committed individual or community from using other device targets, but the main project chooses specifically to use their smaller resources to pursue excellence rather than mediocrity.</p>
]]></description><pubDate>Fri, 27 Feb 2026 22:56:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47187035</link><dc:creator>ysnp</dc:creator><comments>https://news.ycombinator.com/item?id=47187035</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47187035</guid></item></channel></rss>