Skip Navigation
GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 137 released
github.com Release config-137 · GrapheneOS/platform_packages_apps_GmsCompat

Changes in version 137: update max supported version of Play services to 24.36 update max supported version of Play Store to 42.7 A full list of changes from the previous release (version 136) is...

Release config-137 · GrapheneOS/platform_packages_apps_GmsCompat

Changes in version 137:

  • update max supported version of Play services to 24.36
  • update max supported version of Play Store to 42.7

A full list of changes from the previous release (version 136) is available through the Git commit log between the releases (only changes to the gmscompat_config text file and config-holder/ directory are part of GmsCompatConfig).

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.

0
Vanadium version 128.0.6613.146.0 released
github.com Release 128.0.6613.146.0 · GrapheneOS/Vanadium

Changes in version 128.0.6613.146.0: update to Chromium 128.0.6613.146 A full list of changes from the previous release (version 128.0.6613.127.0) is available through the Git commit log between ...

Release 128.0.6613.146.0 · GrapheneOS/Vanadium

Changes in version 128.0.6613.146.0:

  • update to Chromium 128.0.6613.146

A full list of changes from the previous release (version 128.0.6613.127.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

0
GrapheneOS Android 15 Port Progress [UPDATED]
grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

Our Android 15 port is increasingly solid. It can currently be tested by building the OS via https://grapheneos.org/build. Since there aren't stable releases of Android 15 available yet, we currently support using the firmware, etc. from the Pixel Android 15 Beta releases for Pixels.

Our Android 15 port is increasingly solid. It can currently be tested by building the OS via https://grapheneos.org/build. Since there aren't stable releases of Android 15 available yet, we currently support using the firmware, etc. from the Pixel Android 15 Beta releases for Pixels.

6
GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 136 released
github.com Release config-136 · GrapheneOS/platform_packages_apps_GmsCompat

Changes in version 136: update max supported version of Play Store to 42.6 add stub for BluetoothDevice.setPairingConfirmation() update SDK to 35 (Android 15) update target API level to 35 (Androi...

Release config-136 · GrapheneOS/platform_packages_apps_GmsCompat

Changes in version 136:

  • update max supported version of Play Store to 42.6
  • add stub for BluetoothDevice.setPairingConfirmation()
  • update SDK to 35 (Android 15)
  • update target API level to 35 (Android 15)

A full list of changes from the previous release (version 135) is available through the Git commit log between the releases (only changes to the gmscompat_config text file and config-holder/ directory are part of GmsCompatConfig).

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.

0
Auditor app version 85 released
github.com Release 85 · GrapheneOS/Auditor

Notable changes in version 85: make remote verification more prominent by moving it to the main screen from the action menu use correct theme for attestation activity background color add support ...

Release 85 · GrapheneOS/Auditor

Notable changes in version 85:

  • make remote verification more prominent by moving it to the main screen from the action menu
  • use correct theme for attestation activity background color
  • add support for Material You
  • update NDK to 27.1.12297006
  • enable generation of v4 APK signatures to replace fs-verity metadata for updates on Android 15 GrapheneOS

A full list of changes from the previous release (version 84) is available through the Git commit log between the releases.

The Auditor app uses hardware security features on supported devices to validate the integrity of the operating system from another Android device. It will verify that the device is running the stock operating system with the bootloader locked and that no tampering with the operating system has occurred. It will also detect downgrades to a previous version.

It cannot be bypassed by modifying or tampering with the operating system (OS) because it receives signed device information from the device's Trusted Execution Environment (TEE) or Hardware Security Module (HSM) including the verified boot state, operating system variant and operating system version. The verification is much more meaningful after the initial pairing as the app primarily relies on Trust On First Use via pinning. It also verifies the identity of the device after the initial verification. Trust is chained through the verified OS to the app to bootstrap software checks with results displayed in a separate section.

This app is available through the Play Store with the app.attestation.auditor.play app id. Play Store releases go through review and it usually takes around 1 to 3 days before the Play Store pushes out the update to users. Play Store releases use Play Signing, so we use a separate app id from the releases we publish ourselves to avoid conflicts and to distinguish between them. Each release is initially pushed out through the Beta channel followed by the Stable channel.

Releases of the app signed by GrapheneOS with the app.attestation.auditor app id are published in the GrapheneOS App Store. These releases are also bundled as part of GrapheneOS. You can use the GrapheneOS App Store for automatic updates. Each release is initially pushed out through the Alpha channel, followed by the Beta channel and then finally the Stable channel.

0
GrapheneOS App Store version 25 released
github.com Release 25 · GrapheneOS/AppStore

Notable changes in version 25: add support for using v4 APK signatures instead of fs-verity metadata on Android 15 enable generation of v4 APK signatures to replace fs-verity metadata for updates ...

Release 25 · GrapheneOS/AppStore

Notable changes in version 25:

  • add support for using v4 APK signatures instead of fs-verity metadata on Android 15
  • enable generation of v4 APK signatures to replace fs-verity metadata for updates on Android 15 GrapheneOS
  • skip system package check for static dependencies self checks
  • extend workaround for PackageInstaller sessions getting stuck to newer Android versions
  • update AndroidX Lifecycle libraries to 2.8.5
  • update AndroidX Navigation KTX libraries to 2.8.0
  • update AndroidX Fragment library to 1.8.3
  • update AndroidX Activity KTX library to 1.9.2
  • update Gradle to 8.10
  • update Android Gradle plugin to 8.6.0
  • update Kotlin to 2.0.20
  • update Kotlin Symbol Processing to 1.0.25

A full list of changes from the previous release (version 24) is available through the Git commit log between the releases.

App Store is the client for the GrapheneOS app repository. It's included in GrapheneOS but can also be used on other Android 12+ operating systems. Our app repository currently provides our standalone apps, out-of-band updates to certain GrapheneOS components and a mirror of the core Google Play apps and Android Auto to make it easy for GrapheneOS users to install sandboxed Google Play with versions of the Google Play apps we've tested with our sandboxed Google Play compatibility layer.

GrapheneOS users must either obtain GrapheneOS app updates through our App Store or install it with adb install-multiple with both the APK and fs-verity metadata since fs-verity metadata is now required for out-of-band system app updates on GrapheneOS as part of extending verified boot to them.

0
GrapheneOS Info app version 4 released
github.com Release 4 · GrapheneOS/Info

Notable changes in version 4: use standard top app bar text style use steadily decreasing header sizes for release notes define night-specific theme to make text selection toolbar and splash scree...

Release 4 · GrapheneOS/Info

Notable changes in version 4:

  • use standard top app bar text style
  • use steadily decreasing header sizes for release notes
  • define night-specific theme to make text selection toolbar and splash screen adapt to the current theme
  • update Kotlin to 2.0.20
  • update Gradle to 8.10
  • update Android Gradle plugin to 8.6.0
  • update Android build tools to 35.0.0
  • update Android NDK to 27.0.12077973
  • update AndroidX Compose BOM to 2024.09.00
  • switch AndroidX Compose UI Text library version from AndroidX Compose BOM now that 1.7.0 has a stable release and is included
  • update AndroidX Compose Navigation to 2.8.0
  • update AndroidX Lifecycle libraries to 2.8.5
  • update AndroidX Activity Compose to 1.9.2
  • enable generation of v4 APK signatures to replace fs-verity metadata for updates on Android 15 GrapheneOS
  • add whitelist of supported languages for resources (currently English)

A full list of changes from the previous release (version 3) is available through the Git commit log between the releases.

Releases of the app are published in the GrapheneOS App Store. These releases are also bundled as part of GrapheneOS. You can use the GrapheneOS App Store on Android 12 or later for automatic updates. Each release is initially pushed out through the Alpha channel, followed by the Beta channel and then finally the Stable channel.

0
GrapheneOS Organization Discusses Adblocking & Adblocker Tests
grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

Author is willing to fix issues but since ad blockers are cheating it'd need to be moved to another domain after fixing it. Vanadium will not include rules for cheating at content filtering tests because we think it would be a breach of user trust, regardless of flaws in a test.

Ad blocking test at https://d3ward.github.io/toolz/adblock is extremely flawed. It tests domains which are not used for ads/tracking and doesn't take into account that mainstream ad blocking is blocking specific paths hosted at those domains. Mainstream ad blockers also cheat at these tests.

Here's where uBlock Origin simply fudges the results for the test by blocking everything tested by d3ward.github.io:

https://github.com/uBlockOrigin/uAssets/blob/master/filters/filters.txt#L14202-L14206

Brave uses uBlock Origin filters as their base set of filters and then extends it, so it's cheating at the test through that too.

Here's where Adguard cheats at the test, which is at least done case-by-case with explanations:

https://github.com/AdguardTeam/AdguardFilters/blob/daba77058c72b983f2a46b97dca5b669710a7414/SpywareFilter/sections/specific.txt#L4491-L4521

Some of the tested domains are simply not used on other sites. In other cases, it is used that way but blocking it would break sites so they don't do it.

Author is willing to fix issues but since ad blockers are cheating it'd need to be moved to another domain after fixing it.

Vanadium will not include rules for cheating at content filtering tests because we think it would be a breach of user trust, regardless of flaws in a test.

0
Vanadium version 128.0.6613.127.0 released
github.com Release 128.0.6613.127.0 · GrapheneOS/Vanadium

Changes in version 128.0.6613.127.0: update to Chromium 128.0.6613.127 mark Vanadium Config as forceQueryable to support reading the configuration from apps using the WebView for feature flags A ...

Release 128.0.6613.127.0 · GrapheneOS/Vanadium

Changes in version 128.0.6613.127.0:

  • update to Chromium 128.0.6613.127
  • mark Vanadium Config as forceQueryable to support reading the configuration from apps using the WebView for feature flags

A full list of changes from the previous release (version 128.0.6613.99.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

0
GrapheneOS version 2024090400 released
grapheneos.org GrapheneOS releases

Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.

GrapheneOS releases

Pixel 4a (5G), Pixel 5 and Pixel 5a are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.

Tags:

  • 2024090400-redfin (Pixel 4a (5G), Pixel 5)
  • 2024090400 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
  • 2024090400-caimito (Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold)

Changes since the 2024083100 release:

  • full 2024-09-05 security patch level
  • rebased onto AP2A.240905.003 (generic) and AD1A.240905.004 (caimito) Android Open Source Project releases
  • Sandboxed Google Play compatibility layer: add support for using GSF 34 on SDK 35 (Android 15) to handle the case where users have just upgraded the OS but haven't yet updated GSF
  • Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold: fix an upstream use-after-free bug present in 2 drivers
  • allow Pixel Thermometer and Fitbit to see each other as a special case
  • allow current launcher to see the Pixel Thermometer app as a special case
  • kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.47
  • GmsCompatConfig: update to version 134
  • GmsCompatConfig: update to version 135
0
Port Of Device-Independent GrapheneOS Code To Android 15 Is Done
grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

Our initial port of device-independent GrapheneOS code to Android 15 is done and we're testing it in the emulator. We still need to port the kernels, device-specific repositories, adevtool and generate the new vendor state. Can already be built for emulator from our 15 branch.

Our initial port of device-independent GrapheneOS code to Android 15 is done and we're testing it in the emulator. We still need to port the kernels, device-specific repositories, adevtool and generate the new vendor state. Can already be built for emulator from our 15 branch.

0
GrapheneOS Organization Discusses Wipe Bypass To Be Fixed For Non-Pixels
grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

Patch for CVE-2024-32896 was included in an upcoming major release (Android 14 QPR3 in June 2024) and that's why non-Pixel devices didn't get it, because they don't actually update to the new monthly/quarterly releases. Now that it's in the ASB, they'll apply the backport.

September 2024 Android Security Bulletin includes a patch for the wipe bypass we reported: CVE-2024-32896. It's actively exploited by forensic companies across devices. Pixels patched it in June 2024...

September ASB: https://source.android.com/docs/security/bulletin/2024-09-01June PUB: https://source.android.com/docs/security/bulletin/pixel/2024-06-01

We reported several vulnerabilities exploited by forensic companies in January 2024. We proposed implementing firmware reset attack mitigation and wipe-without-reboot. Pixels shipped reset attack mitigation in April 2024 and also a firmware mitigation making wipe bypasses harder.

In June 2024, Pixels shipped our wipe-without-reboot proposal to fully eliminate wipe bypasses. The full solution is a set of AOSP patches (https://android.googlesource.com/platform/frameworks/base/+/8b7b2c66ca96d711fb364cbcc9d655197d9743e0) but they still classified it as a firmware patch since it was treated as phase 2 of the Pixel firmware patches.

We pointed out that it was actually an AOSP patch which should be shipped for all devices, and they agreed with us and scheduled it for inclusion in September. Wipe bypass is now finally going to be fixed for non-Pixels. Reset attack mitigation will still be missing elsewhere.

We extended wipe-without-reboot with extra wiping and use it as part of our duress PIN/password feature.

Forensic companies are still able to exploit stock OS Pixels, but reset attack mitigation helps prevent bypassing GrapheneOS security via firmware.

https://grapheneos.social/@GrapheneOS/112826160880324005

Each month, there's a new Android monthly, quarterly or yearly release. This month is a monthly release of Android 14 QPR3, the 3rd quarterly release of Android 14 from June 2024. Android Security Bulletins have a subset of overall privacy/security patches. This is one example.

Android Security Bulletins include the High and Critical severity patches for the Android Open Source Project backported to older releases (12, 12.1, 13, 14) and a small selection of firmware/driver patches for specific hardware. Non-Pixels ship these backports. Pixels ship more.

Android OEMs are responsible for making their own more complete set of patches and incorporating patches from the SoC vendor and other hardware vendors for their devices. The Pixel Update Bulletins largely consist of these extra patches from Samsung, Qualcomm, Broadcom, etc.

Low and Moderate severity patches are almost entirely not backported to older Android releases and aren't listed in the Android Security Bulletins.

Android 14 QPR3 from June is the current major release, not Android 14. Monthly updates since then are more than ASB patches.

Patch for CVE-2024-32896 was included in an upcoming major release (Android 14 QPR3 in June 2024) and that's why non-Pixel devices didn't get it, because they don't actually update to the new monthly/quarterly releases. Now that it's in the ASB, they'll apply the backport.

0
GrapheneOS Support For The Pixel 9 Pro Fold Is Now Stable
grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

GrapheneOS support for the Pixel 9 Pro Fold is no longer marked experimental and is now available through our production site: https://grapheneos.org/releases https://grapheneos.org/install/web Our 2024083100 release has been confirmed to be working and to have a working future upgrade path.

GrapheneOS support for the Pixel 9 Pro Fold is no longer marked experimental and is now available through our production site:

https://grapheneos.org/releases https://grapheneos.org/install/web

Our 2024083100 release has been confirmed to be working and to have a working future upgrade path.

0
GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 135 released
github.com Release config-135 · GrapheneOS/platform_packages_apps_GmsCompat

Changes in version 135: update max supported version of Play services to 24.35 update max supported version of Play Store to 42.5 enable generation of v4 APK signatures A full list of changes fro...

Release config-135 · GrapheneOS/platform_packages_apps_GmsCompat

Changes in version 135:

  • update max supported version of Play services to 24.35
  • update max supported version of Play Store to 42.5
  • enable generation of v4 APK signatures

A full list of changes from the previous release (version 134) is available through the Git commit log between the releases (only changes to the gmscompat_config text file and config-holder/ directory are part of GmsCompatConfig).

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.

0
GrapheneOS Organization Address Telegram Flaws
  • General thought is that if meta was lying about E2EE, due to their massive size, it would likely be leaked to the general public that they were lying. The app also has such a large userbase of skilled security researchers that can and do reverse engineer it, so they'd also find if meta lied.

  • GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 134 released
    github.com Release config-134 · GrapheneOS/platform_packages_apps_GmsCompat

    Changes in version 134: add new approach to disabling Play services OS update service required by 24.31 onwards to avoid uncaught exceptions in rare cases it tries to run update Android Gradle plu...

    Release config-134 · GrapheneOS/platform_packages_apps_GmsCompat

    Changes in version 134:

    • add new approach to disabling Play services OS update service required by 24.31 onwards to avoid uncaught exceptions in rare cases it tries to run
    • update Android Gradle plugin to 8.6.0

    A full list of changes from the previous release (version 133) is available through the Git commit log between the releases (only changes to the gmscompat_config text file and config-holder/ directory are part of GmsCompatConfig).

    This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release.

    0
    GrapheneOS version 2024083100 released
    grapheneos.org GrapheneOS releases

    Official releases of GrapheneOS, a security and privacy focused mobile OS with Android app compatibility.

    GrapheneOS releases

    Pixel 4a (5G) and Pixel 5 are end-of-life and shouldn't be used anymore due to lack of security patches for firmware and drivers. We provide extended support for harm reduction.

    Tags:

    • 2024083100-redfin (Pixel 4a (5G), Pixel 5)
    • 2024083100 (Pixel 5a, Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, emulator, generic, other targets)
    • 2024083100-caimito (Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold)

    Changes since the 2024082200 release:

    • don't hide Exploit protection Safety Center item in secondary users
    • Settings: improve UI for GrapheneOS app toggles including adding a screen for viewing the values across apps for each toggle
    • add more infrastructure for blocking dynamic code loading
    • Settings: add per-app memory dynamic code loading restriction toggle (applies to both native code and Android Runtime class loading for Java/Kotlin)
    • Settings: add per-app storage dynamic code loading restriction toggle (applies to both native code and Android Runtime class loading for Java/Kotlin), temporarily without a global toggle until Google phases out the old dynamite module system for Google Play due to many apps temporarily depending on this through it
    • Settings: add per-app WebView JIT restriction toggle
    • add production support for the Pixel 9, Pixel 9 Pro and Pixel 9 Pro XL
    • add experimental support for the Pixel 9 Pro Fold (we haven't received our preordered device for testing yet)
    • add support for enabling app association restrictions without exemptions (currently for use with Pixel Thermometer)
    • add support for Pixel Thermometer app available from our App Store for the Pixel 8 Pro, Pixel 9 Pro and Pixel 9 Pro XL with strict isolation from other apps
    • add missing feature compatibility matrix definitions (mainly for 9th generation Pixels)
    • Contact Scopes: explicitly set initialization order after ContactsProvider2 to avoid uncaught exceptions from a race
    • kernel (6.1): disable unused hibernation support
    • kernel (6.1, 6.6): enable struct randomization in the full mode with a deterministic seed based on kernel commit timestamp (we plan to also incorporate the device family and eventually make the seed specific to each device model, but it will increase our build/testing workload)
    • kernel (6.6): enable random kmalloc caches
    • kernel (5.10): update to latest GKI LTS branch revision
    • kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.96
    • kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.46
    • Vanadium: update to version 128.0.6613.88.1
    • Vanadium: update to version 128.0.6613.99.0
    • Auditor: update to version 84
    • GmsCompatConfig: update to version 131
    • GmsCompatConfig: update to version 132
    • GmsCompatConfig: update to version 133
    • drop restriction on modifying GrapheneOS-specific per-package settings via ADB shell since it makes certain important testing require debug builds and has no real security value
    • flash-all.sh: restore POSIX sh compatibility to allow using sh instead of bash on systems where sh is dash or another non-bash-compatible shell
    • add support for using backslashes in the passphrases for encrypting the keys for signing OS releases
    0
    Experimental Release Of GrapheneOS For Pixel 9 Fold Now Available
    grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

    Everything has been ported for it already and there's nothing else to do for it without testing feedback from users. There's a high chance everything is already fine for it since we have production quality support for the other 9th gen Pixels and the original 7th gen Pixel Fold.

    We've published an initial experimental release for the Pixel 9 Pro Fold on our staging site:

    https://staging.grapheneos.org/releases#comet-stablehttps://staging.grapheneos.org/install/web

    Our preordered Pixel 9 Pro Fold for our device testing farm hasn't arrived yet so we'll be relying on others to test the early builds.

    Everything has been ported for it already and there's nothing else to do for it without testing feedback from users. There's a high chance everything is already fine for it since we have production quality support for the other 9th gen Pixels and the original 7th gen Pixel Fold.

    0
    Pixel 9 Fold Support Arrives To GrapheneOS Auditor App
    grapheneos.social GrapheneOS (@GrapheneOS@grapheneos.social)

    Source code and factory images for the Pixel 9 Pro Fold have been published. We've added support for it to our Auditor app: https://grapheneos.social/@GrapheneOS/113047519006891751. We're beginning work on adding GrapheneOS support but our test device hasn't arrived yet so we won't be able to test o...

    Source code and factory images for the Pixel 9 Pro Fold have been published. We've added support for it to our Auditor app: https://grapheneos.social/@GrapheneOS/113047519006891751. We're beginning work on adding GrapheneOS support but our test device hasn't arrived yet so we won't be able to test ourselves yet.

    0
    Auditor app version 84 released
    github.com Release 84 · GrapheneOS/Auditor

    Notable changes in version 84: add support for Pixel 9 Pro Fold with either the stock OS or GrapheneOS update Android Gradle plugin to 8.6.0 update Kotlin to 2.0.20 A full list of changes from th...

    Release 84 · GrapheneOS/Auditor

    Notable changes in version 84:

    • add support for Pixel 9 Pro Fold with either the stock OS or GrapheneOS
    • update Android Gradle plugin to 8.6.0
    • update Kotlin to 2.0.20

    A full list of changes from the previous release (version 83) is available through the Git commit log between the releases.

    The Auditor app uses hardware security features on supported devices to validate the integrity of the operating system from another Android device. It will verify that the device is running the stock operating system with the bootloader locked and that no tampering with the operating system has occurred. It will also detect downgrades to a previous version.

    It cannot be bypassed by modifying or tampering with the operating system (OS) because it receives signed device information from the device's Trusted Execution Environment (TEE) or Hardware Security Module (HSM) including the verified boot state, operating system variant and operating system version. The verification is much more meaningful after the initial pairing as the app primarily relies on Trust On First Use via pinning. It also verifies the identity of the device after the initial verification. Trust is chained through the verified OS to the app to bootstrap software checks with results displayed in a separate section.

    This app is available through the Play Store with the app.attestation.auditor.play app id. Play Store releases go through review and it usually takes around 1 to 3 days before the Play Store pushes out the update to users. Play Store releases use Play Signing, so we use a separate app id from the releases we publish ourselves to avoid conflicts and to distinguish between them. Each release is initially pushed out through the Beta channel followed by the Stable channel.

    Releases of the app signed by GrapheneOS with the app.attestation.auditor app id are published in the GrapheneOS App Store and on GitHub. These releases are also bundled as part of GrapheneOS. You can use the GrapheneOS App Store on Android 12 or later for automatic updates. Each release is initially pushed out through the Alpha channel, followed by the Beta channel and then finally the Stable channel.

    GrapheneOS users must either obtain GrapheneOS app updates through our App Store or install it with adb install-multiple with both the APK and fs-verity metadata since fs-verity metadata is now required for out-of-band system app updates on GrapheneOS as part of extending verified boot to them.

    0
    Vanadium version 128.0.6613.99.0 released
    github.com Release 128.0.6613.99.0 · GrapheneOS/Vanadium

    Changes in version 128.0.6613.99.0: update to Chromium 128.0.6613.99 backport upstream implementation of enforcing blob URL partitioning enforce dynamic code execution restrictions with seccomp-bp...

    Release 128.0.6613.99.0 · GrapheneOS/Vanadium

    Changes in version 128.0.6613.99.0:

    • update to Chromium 128.0.6613.99
    • backport upstream implementation of enforcing blob URL partitioning
    • enforce dynamic code execution restrictions with seccomp-bpf when JIT is disabled (prevent creating executable anonymous mappings, writable and executable file mappings or marking a non-executable mapping executable)
    • explicitly declare queries to Vanadium Config package for both the WebView and browser

    A full list of changes from the previous release (version 128.0.6613.88.1) is available through the Git commit log between the releases.

    This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

    0
    GrapheneOS Organization Reattempting VPN DNS Leak Prevention
  • Do you have "block all connections without VPN" enabled in android setting? Do you have have VPN in use for multiple profiles? Sms and voice over wi-fi are not routed through VPNs on main user profile.

  • GrapheneOS Camera app version 71 released
  • GrapheneOS includes our own modern camera app focused on privacy and security. It includes modes for capturing images, videos and QR / barcode scanning along with additional modes based on CameraX vendor extensions (Portrait, HDR, Night, Face Retouch and Auto) on devices where they're available (Pixels currently only have support for Night mode).

    Source: https://grapheneos.org/usage#grapheneos-camera-app

    This forum thread also has further discussions on this: https://discuss.grapheneos.org/d/1889-grapheneos-camera-portrait-night-shot-etc

    Hope this helps answer your question.

  • GrapheneOS Officially Supports The Accrescent App Store
  • Accrescent has a list of apps that can be easily installed, unlike Obtainium, Accrescent doesn't require the user to spend a lot of time adding each app they want to auto update/install to Accrescent as the apps are aleeady there. Similar to playstore.

    Obtainiums only advantage to me is that you can add almost any app source, while Accrescent still is in development and as such lacks lots of apps at the moment.

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)KI
    KindnessInfinity @lemmy.ml

    She/Her

    Spreading positivity and kindness

    Posts 437
    Comments 135