← Back to context

Comment by zozbot234

8 days ago

It's quite secure against casual attacks, but a proprietary mobile platform has inherent issues wrt. withstanding even mildly sophisticated attackers, including mercenary spyware services. You still have a huge attack surface from all sorts of proprietary firmware blobs and hardware IP blocks that are running directly on the SoC. It's not clear that it's really worth even trying to secure it as opposed to just treating it like an untrusted toy.

Interesting. What are the alternatives to GrapheneOS that you wouldn't consider a "toy" ?

well, a concerted attack could easily subvert the baseband if you have a few million dollars and the correct letterhead or private contacts.

GrapheneOS really wants the software in the phone to not pwn the phone. This is good. Its a different, and much more difficult problem to secure the connection to the telco, and the larger internet, because the transport is attacker controlled.

Think of it this way: Say you use Qubes because security is valued very highly for you. Even if you run Qubes, if your router is controlled by your attacker, what kind of a security guarantee could you really get for yourself?

  • > well, a concerted attack could easily subvert the baseband

    In theory Pixel phones have IOMMU and GrapheneOS is using them, so even a compromised baseband doesn't result unrestricted access to the system.

  • GrapheneOS distrusts the network. Connections use HTTPS and the integrity of important things like updates is also verified via signatures.

  • > Even if you run Qubes, if your router is controlled by your attacker, what kind of a security guarantee could you really get for yourself?

    I do run Qubes, and a compromised router, e.g., will not get access to any passwords that I store in an offline VM as text, even with any previously known vulnerability since 2006.

The firmware being proprietary is compeltely unrelated to how much attack surface it has compared to open source firmware. The only thing that matters is how secure the firmware is.

So if a toy OS is the only one to withstand attacks with Cellebrite, what do you consider not a toy?