She/Her

Spreading positivity and kindness

  • 1 Post
  • 21 Comments
Joined 1Y ago
cake
Cake day: Jun 01, 2023

help-circle
rss

Clearly a woman. “My lady” would’ve been more appropriate. Please don’t be rude


Wallet tap to pay will not work.


You’re welcome. Thank you for your kind comment.


Figured I should let you know. GOS is an Operating System, which is different from ROM which is short for Read Only Memory. It’s like calling windows on your PC a ROM instead of an OS. It makes no sense.



You mentioned, firefox. The app could be updated to better support tablet UI. That’s what I meant.


Well if I have a tablet, it wouldn’t be for Linux based apps, unless maybe some SSH/terminal stuff anyway. The apps mentioned would need to update to properly support tablets, if they haven’t been yet.


You get the latest release straight from the source, best benefit





I use newpipe or libretube on mobile.


When you use Play App Signing, your keys are stored on the same secure infrastructure that Google uses to store its own keys. Keys are protected by Google’s Key Management Service. If you want to learn more about

For apps created before August 2021, you can still upload an APK and manage your own keys instead of using Play App Signing and publishing with an Android App Bundle

Source: Google Support


I would recommend buying a pixel tablet and installing !grapheneos@lemmy.ml on it. !grapheneos@lemmy.ml is private and doesn’t send anything to Google. You can get a pixel tab second-hand.


GrapheneOS is protecting people from bad actors who get ahold of these devices


GrapheneOS Data Extraction Protections
cross-posted from: https://lemmy.ml/post/1784484 > Cellebrite and others in their industry use logical extraction to refer to extracting data from a device after unlocking it, enabling developer options (requires PIN/password), enabling ADB and permitting access for the ADB key of the attached device. See https://cellebrite.com/en/glossary/logical-extraction-mobile-forensics/ > The baseline doesn't involve exploitation. The next step up is exploitation via ADB to obtain more data than ADB makes available. > > Obtaining data from a locked device requires an exploit. If it was unlocked since boot, the OS can access most data of the currently logged in users. > > GrapheneOS includes our auto-reboot feature to automatically get data back at rest so that it's not obtainable even if the device is exploited. Can set this to a much lower value than the default 72 hours. 12 hours won't cause inconveniences for most users, but you can go lower. > > User profiles that are not currently active have their data at rest. GrapheneOS provides the option to put secondary users back at rest via end session for convenience. Sensitive global system data is stored by the Owner user, which is why you can't log into another user first. > > GrapheneOS also provides the option to disable keeping a secondary user active in the background, to force ending the session when switching away from it. > > We provide substantial exploit protection features (https://grapheneos.org/features#exploit-protection), and we're working on some major improvements. > > For user profiles that are not currently logged in, their data is protected by encryption even if the device is exploited. An attacker needs to brute force the password. If you use a strong random passphrase, they cannot do it. Otherwise, you depend on hardware-based security. > > Most Android devices don't have decent hardware-based encryption security. If a typical Android device has the OS exploited, the attacker can trivially bypass any typical PIN/passphrase via brute force. We only support devices defending against this (https://grapheneos.org/faq#encryption). > > iPhones, Pixels and certain other Android devices provide hardware-based throttling of unlock attempts via a secure element. We explain how this works at https://grapheneos.org/faq#encryption. This protection depends on security of the secure element, which is quite good for Pixel 6 and later.
fedilink

I’m not sure if GrapheneOS uses the stock dialer and SMS apps

Can confirm, they are the stock apps


GrapheneOS will be fine. There are other open source apps available for carrier-based calls and texts. Development of the AOSP apps can also be continued Source: https://nitter.net/GrapheneOS/status/1669196420333682689

You may also read the community discussion on this here: https://discuss.grapheneos.org/d/5612-about-the-future-of-the-messages-and-dialer-app


Android uses the Linux kernal, so it is technically linux


These apps are open source, so a OS developer should be able to forward port the deprecated app into their newer OS release. Kinda fear monger a bit here


Fun fact: Android uses the Linux kernal. So they are also Linux phones.