Man Lemmy is so much better than Reddit.

  • 0 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: June 1st, 2023

help-circle
  • I’ve used graphene for over a year, and it’s been solid. If you have the sandboxed Google play installed all apps will work fine, and as long as you don’t rely on heavily commercialized apps everything will likely work without play services as well (sans push notifications for apps that rely on firebase). RCS will work if you have Gplay services and the carrier services app installed.

    One in a while there will be a slight hiccup in the UI, but I’ve experienced far worse on stock android, so I’m assuming it’s normal operating stutters. All in all it’s very reliable.



  • Me too, the mobile device landscape is definitely shaped by consumerist values. Divest has been intriguing me lately as well, I used to think it was a more flexible, less hardened alternative to Graphene, but it seems to have continued on down the road a ways past Graphene now. That wiki looks super interesting, I’m going to check it out. Just a quick look through what they have looks like high quality info.


  • Yes that’s the benefit of verified boot, and it is a helpful security feature. However, if you’ve used or are using Windows or Linux as an operating system, then you are comfortable with using a device that does not have verified boot (not sure about iOS and Mac, I’m not familiar with them). The risk you’re talking about with malicious code being injected in to an app you’ve chosen to trust is a threat to any device, verified boot or not. Modification of the kernel is an attack vector, but it certainly isn’t the only way for an app to cause mischief on your phone and devices are all relatively as vulnerable to developer or supply chain attacks.

    Using software someone else developed always comes down to trust, unless you are auditing the code for every app you use, which I don’t think either you or I are. Having features that increase security in some technical way feels good but may lull us a sense of security. For instance, here’s a quote from a security researcher that I ran across in the past. It’s regarding the reputation for security that iOS has:

    Erez Metula, founder of a a security and penetration testing firm called AppSec labs: “There’s a myth that iOS apps are more secure than Android. But the truth is, iOS apps are even worse in terms of security. When we do penetration testing for our customers, we’re often asked to test their Android and iOS versions of the same app. We have realized that since iOS developers incorrectly assume that iOS is ‘more secure,’ they allow themselves to make bad security decisions that open up vulnerabilities in their app.” He added, “Interestingly, since Android developers think that Android security is worse, it pressures them to follow better security practices.”

    The same is true for us users. Security features are important, but user education and awareness is the most important element of keeping ourselves from ‘making bad decisions and opening up security vulnerabilities’ in our device usage.

    Thankfully like you said, there are thousands of highly qualified individuals vetting the code of mainstream open source projects, which saves us regular users in the case we face an xz situation. A few principles that outway security features like verified boot in my book are:

    1. Use open source software whenever possible, and make sure that it is widely used and visible to others.
    2. Check the “issues” section of the documentation frequently. Even widely used software can be riddled with unpatched security holes (I’m looking at you Nginx Proxy Manager 😄)
    3. I may get some hate for this one, but use a trusted middleman like F-droid as your app vendor for apps that do not have wide circulation or visibility. They run basic checks of the code for safety before uploading to their repos, checks that regular users are not able to do.

    Unless you are being targeted by a stalker, a malicious state actor or are downloading disreputable software, the average user (with a little bit of knowledge) would be just fine on /e/ or lineageOS. Tens of thousands of people are right now without any problems.


  • Like you say, it is moderately de-googled, which is a fantastic improvement over stock android any way you spin it. I believe that was the point of the original commenter, as it is mine. However there are those blobs that do get left in (in every ROM, including even DivestOS which is the most aggresive in this regard). Install a firewall or network monitor on a device that’s only been somewhat deblobbed and you’ll find that they are not little black boxes sending all your data to Google, but instead are there to do things locally like software interaction with hardware in the phone that is from another company like Broadcom.

    Any ROM on a Samsung phone probably lags on security updates due to Samsung itself being slow to release them, though they do seem to be doing better lately. If the ROM itself is slow to push updates, the most you’ll wait is 2-3 months. That’s pretty much not a problem unless you’re being threatened by state level actors, and is the state that the majority of stock android users are in. In fact, stock android can often be years out of date because their manufacturer just doesn’t put them out.

    Regarding dependence on Google services (play store of otherwise), let’s be honest, GrapheneOS users almost always install sandboxed play services, work profile or not. I don’t blame them, it’s how I have Graphene installed on my phone. However, this not a privacy oriented thing to do, it releases a flood of information to Google, much more that a simple connectivity check or SUPL ping. It’s not as much as fully integrated play services though, which is good. MicroG may be theoretically less secure, but it is certainly more private. It simply asks for less information from you than play services do.

    The relockable bootloader subject is bit of a pet peeve of mine. Personally, I do choose to use a pixel so that I can have that added security, as it does have value. However, to say that without a lockable bootloader you are compromising your security and by extension privacy is what i would consider an overstatement that creates fear and uncertainty. Your security and privacy only become compromised if a thief steals your physical device then also has the know how to execute a sophisticated software based attack on the phone using adb. This just isn’t something that happens. In the many years I’ve been around the android ROM community, privacy/security focused or otherwise, I’ve not heard of this happening even once. To tie it back in to the OP, this scenario is actually a perfect use case for the app mentioned in this post, it offers you the ability to remotely wipe the device if it’s been stolen.

    It can be an issue from a software angle though too, but then you would have to download and install a piece of malicious software that is specifically targeting phones without verified boot. At that point there is a greater issue though, because you can download and install malicious software that is targeting phones that DO have verified boot active just as easily. All that’s necessary is to be well informed and have good security habits and behaviors, it’s how desktop competant windows and Linux users have gotten along just fine all these decades.

    It’s easy to get swept up in the security dogma of the android ROM community. In my opinion, some of it is helpful, but some is not practical or useful for every day users.




  • Tuta is where I’m at for now. They have stricter privacy than proton and are much more active in their app development. They have an Fdroid release for android and a desktop app for Linux which make life pretty nice.

    I have had some connectivity issues with their servers lately though, especially on desktop. I don’t know if it’s my DNS setup or if it is unreliability on the server end. In any case it hasnt been too bad.












    • Audile: offline, trackerless music recognition.
    • Keepassdx + Heliboard: both excellent apps in their own right that create a smoother experience of mundane phone use, but they also integrate rather well together and Heliboard will often pop Keepassdx in to its suggestion bar when you enter a log in page. It’s been really nice for me.
    • FUTO voice input: speech to text for those who don’t want to use Google speech services. Frankly, the FUTO app works better than googles app anyways, it always handles grammar correctly as long as you speak relatively clearly, and integrates with Heliboard nicely.
    • Tailscale: for those who need VPN access to their other devices.
    • Thunder : a Lemmy client with compatibility with Lemmy’s recent server side changes and also has a decent UI/UX
    • tasks.org: fantastic, customizable to do app with various syncing options.
    • Magic Earth: privacy respecting maps/directions for those who don’t want google maps. (NOTE: closed source. Here is the privacy policy, terms of use and description of their business model at the bottom of their FAQ)
    • Myne: e-book downloader.
    • Markdownr: convert webpages to markdown. Great option for mobile, if I’m on desktop I use the Joplin web clipper plug in for Firefox.

    Seconding Newpipe, excellent app.

    EDIT: added links to the terms, policies and FAQ of Magic Earth, as it is not open source.


  • Absolutely, there are some really good ways to mitigate the data flow even if you can’t stop it entirely. The OS is a big deal, but I think the most fundamental change to make is the apps and services you use.

    You’ve probably already done that to a degree, but see if there are more changes you can make.

    Alternativeto is an excellent way to explore your options, but also the techlore and the new oil youtube channels are fantastic resources for limiting privacy leaks.

    I’ll post a few debloater apps that I’ve run across when I get home too, I haven’t used them but I know there are options for removing some of the tracking elements of stock android.