Comment by nunobrito

Comment by nunobrito 2 days ago

12 replies

There is little point in fortifying the front-door when the backdoor is wide open.

The hardware itself should never be trusted when being produced by a vendor like Google and cannot be verified on the component level. Their business model completely revolves in reducing your private sphere and sell it to others.

Never use google hardware if you are serious about security.

strcat a day ago

You have it backwards. It's smartphones other than iPhones and Pixels with the front door open due to lack of basic security patches and protections. You're making unsubstantiated claims about backdoors not backed by any evidence. Those claims can be made about ANY available hardware. Using devices without basic privacy/security patches for firmware/drivers, an end-of-life Linux kernel and lack of important hardware-based security features is the opposite of being serious about security.

The reason GrapheneOS has an OEM partner we're working with towards their at least one of their upcoming devices meeting our requirements is because Pixels are the only currently viable options. If other OEMs were making reasonably secure devices with support for using another OS on their own, we wouldn't need OEM partnerships. The currently available devices from our OEM partner don't meet our security features or update requirements, but a subset of their future devices will. GrapheneOS will be officially supported so it will be easier to provide a fully production quality OS and we'll be able to do lower level privacy and security improvements at a hardware, firmware and driver level.

ysnp 2 days ago

All mobile computing and connectivity hardware is unverifiable in reality and by design. It's not some property exclusive to Google Pixels.

Their business model also does not involve selling data afaik, it's selling access to their adspaces [1] all over the internet including the ability to target people (based on information Google jealously hoard). They stand to lose just as much as most other OEMs if they did suspicious things in hardware just like Apple, Samsung etc.

If you're serious about security you will avoid using OEMs that have unfortunate patch gaps which leave device owners at the mercy to *known vulnerabilities* [1][2][3][4] as well as unknown threats which is fortunately one of GrapheneOS's many reasonable device support requirements.

[1] https://blog.google/products/ads-commerce/more-effective-med...

[2] https://srlabs.de/blog/android-patch-gap

[3] https://srlabs.de/blog/android-patch-gap-2020

[4] https://www.android-device-security.org/talks/

[5] https://techcommunity.microsoft.com/blog/vulnerability-manag...

palata 2 days ago

This is nonsense.

If your threat model is that you cannot trust the Pixel hardware, then you cannot trust any smartphone or computer at all, period.

  • nunobrito a day ago

    That is incorrect. There are more reasons for a major US-government contractor to implant spyware on their hardware to hand our privacy on a plate to alphabet agencies than a generic cheap android without a known brand.

    This doesn't mean the cheap device arrives without spyware, likely the difference is the spyware being monitored by chinese rather than US agencies so pick your poison. I'll pick mine.

  • fsflover a day ago

    I trust smartphones with open schematics. Not because it's impossible to hide a backdoor but because it's harder.

    • strcat a day ago

      Open schematics for a PCB don't make it any harder to hide a backdoor. You're talking about devices which still have an entirely closed source SoC with all of the real complexity. The products you're repeatedly marketing here use a bunch of low end components with very poor security including lacking ongoing patches for vulnerabilities and basic standard security protections. They're falsely marketed as open but are actually closed source hardware with closed source firmware. A closed source SoC, Wi-Fi, Bluetooth, cellular, NFC, SSD, touchscreen, camera, etc. attached to a PCB with open schematics is not open hardware.

      • fsflover a day ago

        > They're falsely marketed as open but are actually closed source hardware

        This is just a strawman: Nobody claimed they were open hardware.

        > Open schematics for a PCB don't make it any harder to hide a backdoor.

        This is like saying that FLOSS doesn't make it harder to hide a backdoor. Of course it does.

    • nunobrito a day ago

      Exactly.

      • strcat a day ago

        They're talking about devices known to be extraordinarily insecure, which are still closed source hardware with closed source firmware. Having schematics for the board does not avoid trusting the hardware. It's still a closed source SoC and the same for the other components such as the SSD, Wi-Fi, Bluetooth, cellular, etc. but those components are much less secure without proper updates and security protections. The whole point of an SoC is that it has the complexity of a traditional CPU, GPU, motherboard and other components merged into a single chip, and that's entirely closed source with closed source firmware on those devices.

        • fsflover a day ago

          > extraordinarily insecure

          So you are just attacking another FLOSS community with false [0] claims. This is suspicious.

          [0] You can't say "extraordinary insecure" without specifying a threat model. For some threat models, GrapheneOS is less secure, e.g., https://news.ycombinator.com/item?id=45556788

          Also, if I explicitly don't trust Google with anything, GOS is extraordinarily insecure for me until a new vendor appears.