-
izymandias[m]
overheadscallop: its not very clear
-
dazinism
izymandias: looks like you have a load of 'active' matrix sessions. I'd recommend getting rid of all the ones you don't use and verify the others.
-
izymandias[m]
dazinism: im just curious if verifying these rooms is something that is safe to do
-
dazinism
Think you either verify your sessions with each other (eg. Phone & computer) or other peoples, ideally when you meet them in person
-
dazinism
Dont verify rooms
-
dazinism
izymandias: its generally a good thing to do. With your own devices, its for sharing end to end encryption keys.
-
dazinism
Between the devices that are verified. So you can read encrypted messages from any device.
-
dazinism
Verifying other people lets you know your e2ee hasnt been man-in-the-middled
-
dazinism
Also allows the client to let you know if your contact has new devices (which in some situations may be suspicious)
-
dazinism
Can set it up to only encrypt messages to devices you've verified
-
dazinism
Hopefully you can follow that - lol
-
izymandias[m]
ok
-
izymandias[m]
i get it
-
izymandias[m]
thNKS
-
dazinism
If you suspected one of your devices may be compromised, probably not a good idea to verify it
-
renlord
strcat[m]: this was just merged
GrapheneOS/platform_bionic #5
-
renlord
do you still want me to test with the last 2 commits?
-
strcat[m]
renlord: yes
-
strcat[m]
renlord: test without that commit and without the ASLR commit - just revert the most recent 2
-
renlord
ok
-
BalooRJ
Does anyone know if there is another public server for Konele available to test out the Speech to Text function?
-
mrmanpants[m]
is there a way to stop Graphene from re-promping the password every so often? (when setup with fingerprint)
-
greenmoon[m]
It is different from aosp? On aosp it just prompt after many hours, usually when you sleep it ask for password when u wake up, at least on my phone.
-
greenmoon[m]
Maybe you press the fingerprint multiples times without noticing it, but nowadays the sensor should be turned off if the screen is covered eg in your pocket, not sure if that feature is present on pixels.
-
renlord
strcat[m]: test pass at HEAD~2
-
renlord
5cc8c34e60dbfeb1fd996bf83bb01a0443d93a8a
-
renlord
the 2nd stack ASLR was the commit that broke CTS test
-
zxwayland
hi
-
cdesai
renlord: CTS on emulator would catch this too in theory, right
-
cdesai
Wonder if it'd make sense to have an automated test just for the platform failures then. There can still be full device tests for proper verification, but it could still catch failures early
-
renlord
cdesai: yes
-
renlord
itd be good if it was possible to just run the tests directly in the bionic repo
-
renlord
i dont even know how the CTS gets compiled and how the source ends up in the CTS
-
renlord
wow, so few real irc users :(
-
snark
Hello everyone
-
f8sai[m]
<snark "Hello everyone"> Hello
-
snark
im using grapheneos with pixel 3a / pixel 3a xl - now installed on pixel 4
-
snark
looks like motions sense and smooth display are not supported - I tried to find info on this matter but no success
-
f8sai[m]
<snark "im using grapheneos with pixel 3"> Congrats ^^
-
f8sai[m]
* Congrats
-
f8sai[m]
can't help with that
-
renlord
snark: those things are only distributed via the google vendor images i think
-
f8sai[m]
I'm on 3a
-
f8sai[m]
Maybe checking sensor permission?
-
renlord
if they dont exist on aosp, then you dont have those features
-
snark
mmmh, these features are missing in the settings
-
f8sai[m]
* I'm on 3a
-
f8sai[m]
Maybe check the sensor permission?
-
snark
like the active edges on 3a
-
snark
thing is - they appear in google original firmware (never used it - wiped in favor of GrapheneOS immediately)
-
f8sai[m]
Yeah, those aren't implemented, for reasons "renlord" (
matrix.to/#/@freenode_renlord:matrix.org) have stated
-
snark
"not in AOSP" arguement sounds legit
-
renlord
its not an argument, it is a fact.
-
snark
ok, can live with that fact as well :)
-
snark
thanks for clarification
-
renlord
no prob
-
RedNovember[m]
Hey lads, I'm looking to get the most out of my Pixel 4 with GrapheneOS installed, and I'm looking to install Gcam, Pixel launcher, and Pixel themes. Anyone know if there is any telemetry for these applications with Google and whether they work for Graphene?
-
LinusSexTips[m]
Google apps don't work without microG to my knowledge
-
MysteriousWizard
You can install a patch to get GCam working
-
LinusSexTips[m]
Which we don't have on Graphene
-
MysteriousWizard
Yes
-
MysteriousWizard
Which is why I said install...
-
RedNovember[m]
How can I get it to work?
-
SchismXL[m]
github.com/lukaspieper/Gcam-Services-Provider download and install this apk, then whatever gcam app you wish to use. It'll work then @rednovember:matrix.org
-
g65434-2[m]
<RedNovember[m] "How can I get it to work?"> use stock
-
f8sai[m]
CalyxOS?
-
f8sai[m]
<f8sai[m] "CalyxOS?"> RedNovember
-
f8sai[m]
Not really?
-
f8sai[m]
Or rather there is none for GrapheneOS
-
f8sai[m]
Due to it not meeting the hardware, firmware security requirements
-
f8sai[m]
I recommend searching the logs on freenode.logbot.info/grapheneos
-
strcat[m]
cdesai: any progress on Chromium?
-
anupritaisno1[m]
f8sai [GNU/GPL v3]: it doesn't support
-
anupritaisno1[m]
I guess if we support pinephone we might as well support every phone on the market
-
strcat
it doesn't meet the requirements
-
anupritaisno1[m]
Because pinephone isn't even CTS pass
-
anupritaisno1[m]
It was never designed to run android
-
strcat
it doesn't have the functionality needed to run the OS and certainly can't be secure
-
f8sai[m]
Yeah, thanks for confirming it further
-
f8sai[m]
* Or rather there is none (no Pinephone builds) for GrapheneOS
-
strcat
no verified boot, no hardware-backed keystore, no hardware encryption support and many other things
-
strcat
not a possible target
-
anupritaisno1[m]
f8sai [GNU/GPL v3]: also you need a development team
-
anupritaisno1[m]
We are just securing devices that have already been developed for
-
anupritaisno1[m]
You'd have to start from scratch for pinephone
-
anupritaisno1[m]
And really we don't have those kinds of resources
-
f8sai[m]
<anupritaisno1[m] "f8sai [GNU/GPL v3]: also you nee"> Yeah, just answering the question. Not interested in building it due to not meeting the requirements and not having one myself.
-
anupritaisno1[m]
We'd also need to create our own security bulletins
-
anupritaisno1[m]
And get security researchers to find issues
-
anupritaisno1[m]
Along with rolling out security patches ourselves
-
f8sai[m]
Anyways, thanks for an informative answer. A question, is it possible to tinker or build Android settings without building the whole OS due to limitations in RAM and CPU?
-
f8sai[m]
* Anyways, thanks for an informative answer. A question, is it possible to tinker or build Android settings without building the whole OS due to limitations in RAM and CPU of the computer itself?
-
f8sai[m]
Maybe that will not be feasible due to it having to be tested. Nvm
-
f8sai[m]
(the changes)
-
anupritaisno1[m]
f8sai [GNU/GPL v3]: sometimes
-
anupritaisno1[m]
But this is strictly developer only and assumes you have a build with your own keys in the first place
-
anupritaisno1[m]
If you have your own keys you can rebuild individual parts like apps and test them quickly instead of building a full system image
-
f8sai[m]
Figures, guess I can't do that just yet
-
f8sai[m]
Thanks for the info
-
cdesai
strcat[m]: I did a bunch of builds with different configs, need to check status. But haven't got it working yet unfortunately
-
cdesai
I compiled 85. And master too hoping that if they have a fix we can backport, need to recheck as I fired off the build before logging out on Friday
-
cn3m[m]
<lovesausage[m] "Hi! I just ordered my pixel phon"> that breaks verified boot
-
cn3m[m]
along with other weaknesses
-
cn3m[m]
that is not GrapheneOS if you install magisk
-
cn3m[m]
app ipc is too strong on Android anyway that adds a ton of attack surface even if you fully trust the app
-
nickcalyx[m]
<lovesausage[m] "Hi! I just ordered my pixel phon"> why do you need root so badly
-
theultron[m]
If you go with root then I will recommend you to set a tasker task which will verify important partitions on the boot. It will show if any files have been modified in last 24 hours before you enter your lock screen password.
-
cn3m[m]
<theultron[m] "If you go with root then I will "> that doesn't work
-
cn3m[m]
<lovesausage[m] "Well I use a lot of magisk stuff"> Just use PrivateDNS for blocking
-
cn3m[m]
works the same
-
theultron[m]
<cn3m[m] "that doesn't work"> Why won't it work? It works fine for me.
-
cn3m[m]
<theultron[m] "Why won't it work? It works fine"> you can very easily bypass that app if you get root and change what it is verifying
-
cn3m[m]
there is not physical root of trust
-
cn3m[m]
it is at the whims of the attacker
-
cn3m[m]
Verified Boot has to be in software
-
cn3m[m]
* Verified Boot has to be in hardware*
-
cn3m[m]
even partially hardware solutions don't work well like CloudReady which has many holes in the implementation
-
theultron[m]
But if an attacker is so committed to hack into you then he will find any way. May be he buys an exploit for your device hardware.
-
theultron[m]
<lovesausage[m] "I also use root to change encryp"> You don't need root for that. You can set a long password.
-
cn3m[m]
<theultron[m] "But if an attacker is so committ"> The blobs and everything is verified with verified boot too
-
cn3m[m]
<lovesausage[m] "I also use root to change encryp"> that is not needed with the architectural changes on Android and Pixels
-
cn3m[m]
a 4 digit pin on a Pixel would take 650 years to crack with unlimited computing power
-
lovesausage[m]
I also use root to change encryption password/key from 4 digits to longer one, is this feature included in Graphene?
-
lovesausage[m]
nice, but the same pass for encryption and lockscreen . how come a 4 digit pin takes so long to crack on a Pixel when it goes a lot faster to bruteforce it on others?
-
theultron[m]
I think the Pixel have something called Titan M which makes brute forcing difficult. You still may go with a longer password to be on the safer side.
-
lovesausage[m]
ah , I never understood what the titan M did really
-
theultron[m]
I personally feel the Graphene community enlarges the risk of being rooted on your phone and totally neglect the benefits which come out of it.
-
cn3m[m]
The Titan M is extremely close to the Secure Enclave from Apple which has still secure after 7 years
-
cn3m[m]
The Titan M and Secure Enclave both offer Insider Attack Resistance and rollback protection
-
cn3m[m]
This means Google, GrapheneOS, or Apple could never make a backdoor to open a device after it was locked without your PIN. If they did before it would only work until the next update
-
cn3m[m]
lovesausage: it is very cool tech
-
rover1[m]
<cn3m[m] "The Titan M and Secure Enclave b"> researchers made work on sep, see Hao Xu abstract
mosec.org/en/2020
-
lovesausage[m]
Very cool :)
-
cn3m[m]
The other thing is even if you did attack these chips they have key derivation. For example on the default iPhone with a full SEP exploit would still take on the dedicated crypto hardware 4200 hours
-
cn3m[m]
to break a pin
-
cn3m[m]
if you had a password or a longer than default pin it would be even longer
-
cn3m[m]
<theultron[m] "I personally feel the Graphene c"> rooting breaks the security model of Android. It opens up your device to persistent threat
-
theultron[m]
It's not easy for any app to gain root access on your phone unless it finds an exploit (something like xhelper gained access on older android version but there were enough signs of you being infected)
-
cn3m[m]
if you want to break your remote security and physical security go for it
-
theultron[m]
or you root your phone and manually give access.
-
cn3m[m]
<theultron[m] "It's not easy for any app to gai"> why are you even looking for a secure rom then? There are a lot cooler roms if you don't care about security
-
theultron[m]
Clickjacking attacks in 2020 are dumb.
-
cn3m[m]
you don't need clickjacking
-
cn3m[m]
just an ipc attack
-
cn3m[m]
which is super common on Android
-
cn3m[m]
look at MRW Labs finding 11 to get persistence on Android without memory corruption
-
cn3m[m]
Firefox recently had a vulnerability that would let any app hijack it
-
theultron[m]
<cn3m[m] "why are you even looking for a s"> Ofcourse I care for security. I won't put any cool rom on my phone where I don't know what's inside.
-
cn3m[m]
<theultron[m] "Ofcourse I care for security. I "> you are not running GrapheneOS if you root
-
cn3m[m]
that is not GrapheneOS
-
anupritaisno1[m]
What the hell is going on here?
-
theultron[m]
You can isolate using User Profile for threats using IPC. 2 apps require to communicate for IPC.
-
anupritaisno1[m]
cn3m: apart from the 1M bounty are you describing Qualcomm TEE or Titan M because Qualcomm TEE does that as well
-
theultron[m]
<cn3m[m] "look at MRW Labs finding 11 to g"> Any link for the same?
-
anupritaisno1[m]
There are other reasons for the titan M to be used
-
cn3m[m]
-
cn3m[m]
<anupritaisno1[m] "There are other reasons for the "> yeah
-
theultron[m]
Even if your phone gets hijacked there will be something out of ordinary you notice - notifications? firewall log? check recently installed app?
-
anupritaisno1[m]
theultron: just get grapheneos?
-
cn3m[m]
you are missing the point we want to have secure devices here not ones you have to figure out when you are hacked
-
cn3m[m]
xD
-
cn3m[m]
Rooting GrapheneOS is impossible because then it is not GrapheneOS
-
anupritaisno1[m]
cn3m: *installs magisk on grapheneos*
-
cn3m[m]
<anupritaisno1[m] "cn3m: *installs magisk on graphe"> that is not GrapheneOS
-
anupritaisno1[m]
How so
-
TheJollyRoger
theultron[m]: all instances of GrapheneOS are signed, verified, built reproducibly, there are multiple levels of digital signature validation, and each installation is bitwise identical across each given instance of each device and traceable back to the release keys.
-
TheJollyRoger
This is why we say that "it's not GrapheneOS" if you modify it.
-
cn3m[m]
Daniel has clearly stated for something to be GrapheneOS it has to be locked and can't have play services or magisk
-
cn3m[m]
If it is not locked and has things like that you are running an OS that is not GrapheneOS
-
anupritaisno1[m]
Makes sense
-
theultron[m]
I am not on GrapheneOS as I am happy with my manufacturer's rom. I am not doubting GrapheneOS security at all. I am saying that the risk of being root is blown out of proportion.
-
anupritaisno1[m]
theultron: then recreate dm-verity and use external attestation, it's still weak BTW
-
cn3m[m]
if you have root you have a non immutable OS which is just not going to work with verification
-
fll[m]
> I am not on GrapheneOS as I am happy with my manufacturer's rom. I am not doubting GrapheneOS security at all. I am saying that the risk of being root is blown out of proportion.
-
fll[m]
For average use maybe....graphene is trying to be as secure as possible though.
-
TheJollyRoger
Android isn't built like a desktop operating system, but rather, it's built out of many mutually-distrusting and separate components. The attitude that upstream took is remarkably pragmatic: they realized that a perimeter security model breaks down the instant you run code that may not be 100% trustworthy. So what they did instead was attempt to design android as mutually-distrusting components
-
TheJollyRoger
that are constrained via mandatory access controls to be permitted to do only what they should be doing.
-
g65434-2[m]
but graphene isn't root lmao
-
anupritaisno1[m]
find /system | sort ->hashes
-
anupritaisno1[m]
assert (hashes=oldhashes) else git diff
-
anupritaisno1[m]
Or whatever diff you like
-
TheJollyRoger
This is why only init and a few other components have root-equivalent access.
-
anupritaisno1[m]
This isn't a replacement for dm-verity
-
TheJollyRoger
By rooting, you're essentially saying "screw good security design."
-
fll[m]
Also with root on your phone things like "check logs" become moot, since those could be altered too
-
cn3m[m]
<TheJollyRoger "This is why only init and a few "> init is restricted
-
anupritaisno1[m]
TheJollyRoger: iirc 5 processes have root on android
-
TheJollyRoger
cn3m[m], anupritaisno1[m] ah, okay.
-
anupritaisno1[m]
Time to add a 6th /s
-
» TheJollyRoger snickers
-
anupritaisno1[m]
TheJollyRoger: you free?
-
TheJollyRoger
anupritaisno1[m]: a little. What can I do for you?
-
anupritaisno1[m]
TheJollyRoger: I sent 5 PRs
-
theultron[m]
cn3m: I saw the mwk labs findings. It uses samsung push service for ipc. It's not possible in my case as the only apps which have internet access is Bromite & Orbot. I have removed the updater component of my OEM. You need to plan a specific targeted attack for me.
-
anupritaisno1[m]
I did test them and I was running them for 2 weeks
-
anupritaisno1[m]
But if you can, test them one by one
-
TheJollyRoger
anupritaisno1[m]: ok, uh... might need a bit of help. Sec.
-
cn3m[m]
the only area Android gets an F on security is accessibility services and no easy way to check them. GrapheneOS mitigates this with the Auditor app and remote attestation
-
TheJollyRoger
I'll go get onto that in a bit.
-
cn3m[m]
<theultron[m] "cn3m: I saw the mwk labs finding"> that is not how it works at all
-
theultron[m]
<anupritaisno1[m] "theultron: then recreate dm-veri"> It's weak but works.
-
cn3m[m]
For example if you have any app with root it doesn't care about network permissions(Android apps can bypass virtually all firewalls without root even). Any app can be hijacked
-
cn3m[m]
<theultron[m] "It's weak but works. "> If it is weak that is the definition of not working
-
theultron[m]
<cn3m[m] "For example if you have any app "> How do you bypass AFWall+? Even my kernel is not able to do it.
-
anupritaisno1[m]
cn3m: BTW
-
cn3m[m]
<theultron[m] "How do you bypass AFWall+? Even "> uh no, the kernel absolutely can bypass AFWall. You can talk to other apps like browsers, you can use low level network sockets, you can side step it with root. Just to name a few methods
-
cn3m[m]
<anupritaisno1[m] "cn3m: BTW "> yeah?
-
cn3m[m]
<cn3m[m] "uh no, the kernel absolutely can"> AFWall is incredibly not robust
-
LinusSexTips[m]
Imagine using a third party firewall
-
theultron[m]
You have to plan a very specific attack in order to target me. If I am under any such threat of attack then I won't even use a phone.
-
anupritaisno1[m]
Riotx crashed on me
-
anupritaisno1[m]
Do you think the stock charging animation resembles grapheneos?
-
-
cn3m[m]
<theultron[m] "You have to plan a very specific">
en.wikipedia.org/wiki/Security_through_obscurity
-
cn3m[m]
<anupritaisno1[m] "Do you think the stock charging "> yeah it looks pretty minimal(in a good way)
-
cn3m[m]
looks prettier than the one on mine
-
g65434-2[m]
element is basically riotX
-
g65434-2[m]
except that it crashes after a while
-
fll[m]
Did support riot.im and riotx stop now? No more updates?
-
cn3m[m]
<fll[m] "Did support riot.im and riotx st"> just renamed
-
LinusSexTips[m]
We Element boys now
-
youpie12
Hey any way to use dual apps on one account?
-
lovesausage[m]
well thanks for the info, I guess I will have to manage without root then :) Will feel weird :)
-
cn3m[m]
<lovesausage[m] "well thanks for the info, I gues"> fortunately unrooted Android is far better than it was
-
youpie12
I use shelter now for dual apps but someone mentioned a while ago that its not safe, someone might now why?
-
cn3m[m]
<youpie12 "I use shelter now for dual apps "> it is not that bad really
-
cn3m[m]
it does share clipboard and uses a device manager in the work profile
-
cn3m[m]
neither of which is ideal
-
youpie12
But in case of someone obtaining my device while i restarted it; it shouldn't become less harder to attack right?
-
youpie12
Its more of a privacy issue
-
youpie12
while on
-
youpie12
or am i mistaking
-
TheJollyRoger
If someone obtains your device after you restart it, that phone is encrypted.
-
cn3m[m]
no it wouldn't make it easier to break your phone physically
-
TheJollyRoger
Remember that each profile is encrypted with different keys, which need to be derived using a combination of access tokens contained in the HSM, information in the header partition, and your password.
-
cn3m[m]
<TheJollyRoger "If someone obtains your device a"> with restricted usb even not rebooted you should be fine. Apple hasn't had a Cellebrite like attack claimed since doing that and we just added that back a year ago
-
youpie12
Thanks, the phone still loads up in a second for me with a 20 character password which makes me sometimes think its not encrypted at all.
-
cn3m[m]
Ideally reboot, but GrapheneOS is holding on strong :)
-
TheJollyRoger
youpie12: Would you like to try a simple experiment?
-
youpie12
Cellebrite is my enemy atm
-
youpie12
Yeah
-
TheJollyRoger
Ok. Got a password set? A four digit pincode will do.
-
youpie12
yes
-
cn3m[m]
<youpie12 "Cellebrite is my enemy atm"> don't worry about them lol
-
youpie12
My ''attacker'' will probably try cellebrite ufed
-
youpie12
if got hands on my phone
-
youpie12
thats the reason im on graphen
-
youpie12
dont trust the standard android encryption
-
TheJollyRoger
You do realize those UFED devices when they list supported devices, are for extracting the images of already unlocked devices, correct? Only "lockscreen bypass" means they've got an exploit.
-
cn3m[m]
<youpie12 "dont trust the standard android "> you should it is fantastic
-
cn3m[m]
<TheJollyRoger "You do realize those UFED device"> they can't extract images with the security chips
-
youpie12
I've seen new iphones get hacked
-
cn3m[m]
they could but they are useless
-
youpie12
This pixel chipset shoudl safe
-
cn3m[m]
<youpie12 "I've seen new iphones get hacked"> not really ever since iOS 11 something
-
youpie12
They claim they can get in
-
youpie12
ios 13
-
TheJollyRoger
Ok, simple experiment coming up: reboot your phone, and then when you see "password required after reboot" at the lockscreen, hit 00000 (unless that is your password, in which case you should change it) and press return. Repeat this 50 times;
-
youpie12
in news pages
-
cn3m[m]
iPhones are generally more resistant to these things, but GrapheneOS closes that gap
-
youpie12
Same 000000
-
youpie12
or just similar
-
youpie12
and repeat that 50 times?
-
TheJollyRoger
Yes, or anything but your password. You'll notice that after the first five attempts, it's going to force you to time out 5 seconds, then after the first ten, it's going to force you to time out for 30.
-
youpie12
Ah theres a timer
-
TheJollyRoger
Once you hit 50, it's going to force you to time out for one minute.
-
youpie12
You cant get around a timer?
-
TheJollyRoger
After two weeks of this, it's going to reach 24 hours between attempts.
-
youpie12
Like an exploit
-
youpie12
Because android stock also
-
youpie12
Has one
-
TheJollyRoger
No, you can't. The Titan M contains an access token and its own internal incremental timer that doesn't answer to the host timer.
-
youpie12
Ah now i get it.
-
TheJollyRoger
So even if you found an exploit for the operating system, the Titan M is going to say "Sorry, but your timer doesn't match mine. Fifty seconds, by MY COUNT, and not yours."
-
cn3m[m]
youpie12: they can't get into iOS 13
-
TheJollyRoger
And remember, the Titan contains the access tokens which are needed to derive the keys from the password.
-
cn3m[m]
also key derivation so even if they bypass the timer they still have issues
-
TheJollyRoger
So, youpie12 -
-
TheJollyRoger
Let's say you set a four digit pincode and that four digit pincode is /perfectly/ random, like you used D&D dice to generate it and it's hard to guess. I know you probably are going to set a much longer password, but bear with me for the sake of a thought experiment.
-
youpie12
Yeah i know
-
youpie12
Mathematically
-
youpie12
This will take a long time for
-
youpie12
a brute froce
-
TheJollyRoger
Yep. After two weeks of getting to the maximum, it'll take 650 years to exhaust the keyspace.
-
TheJollyRoger
If you're not certain 650 years is enough for you or you want a little extra peace of mind or you want something to remember, you can use a diceware passphrase.
-
TheJollyRoger
*want something easier to remember.
-
cn3m[m]
It takes half a year for an iPhone encryption chip to break into itself if it were to bypass the timer for a default random pin. That is with bypassing the timer.. crazy hard. I don't know the key derivation on the Pixel though
-
youpie12
I'll shrink down my pass
-
cn3m[m]
it is probably close
-
cn3m[m]
even if you bypassed the timer the PIN would not be trivial to break
-
TheJollyRoger
youpie12: I prefer to use a word passphrase, but that's because I find them easier to memorize.
-
cn3m[m]
which is a big if
-
cn3m[m]
a really big if
-
youpie12
I have avery bigg passphrase
-
youpie12
20 characters pass
-
youpie12
But by knowing this ill cut down half
-
TheJollyRoger
youpie12: size matters, but what matters more in this case, is secrecy, uniqueness, and difficulty of guessing.
-
youpie12
Have random symbols and a random numebr
-
TheJollyRoger
twenty characters' worth of passphrase accounts for zero security bits if it's your mother's maiden name and her year of birth.
-
cn3m[m]
10 even might be overkill if it is random
-
youpie12
Use even longer password for ssd
-
youpie12
Yeah i'll use an easier pass
-
TheJollyRoger
Even though apparently password guesser thinks that that's ~65 bits if I enter it into the "password strength meter."
-
youpie12
Logging in any time took so much effort
-
youpie12
Someone any reccomendation to use instead of shelter, seems to not be working everytime i restart the pone fully i have to reinstall it.
-
cn3m[m]
even with just upper, lower, and numbers a 10 character password would be very strong even with a timer bypass
-
youpie12
Just noticed now again
-
youpie12
So using a 8 digit code
-
youpie12
Random
-
youpie12
Would be already more than enoug
-
youpie12
for no person to be able to get in to in a small timeframe
-
cn3m[m]
<youpie12 "So using a 8 digit code"> yes, but if you had a timer bypass that would eventually fall
-
TheJollyRoger
Yeah. That's why the Titan has its own timer that's sealed within the chip and it only answers to its own timer.
-
TheJollyRoger
Rather than the host's.
-
TheJollyRoger
Two randomly selected words from the pocket edition of the Oxford English Dictionary would give you enough brute force resistance to last probably until well after the Earth gets swallowed by the Sun.
-
TheJollyRoger
Since the pocket edition of the Oxford English dictionary has more than 50,000 words, that's more than 2.5 x 10^9 possible combinations.
-
youpie12
Well eventually there will be a way to still access the data of the phone
-
youpie12
With technology in 10 20 years i dont think the earth is swallowed then but we still dont know that much about computers
-
cn3m[m]
the iPhone has key derivation of ~150ms with dedicated crypto hardware. The Titan M must be similar that is impressive
-
cn3m[m]
that is of course with a timer bypass
-
TheJollyRoger
youpie12: the good news is, the devs already gave thought to that.
-
cn3m[m]
not enforced at all with hardware or software it is all math
-
youpie12
Yeah math
-
youpie12
Untill we discover another way
-
youpie12
to achieve information from a computer
-
cn3m[m]
derivation is very cool
-
youpie12
untill we discover bats and rats instead of bits
-
youpie12
Which already are there but we dont know
-
TheJollyRoger
The cipher on disk is AES-256-HEH for the metadata and AES-256-XTS for your actual data. The cipher was designed to live for more than a century and although there is the possibility of a sufficiently powerful quantum computer being invented in the far future, Grover's Algorithm will only reduce the key strength by its square, which still leaves you with ~128 bit equivalency against a brute
-
TheJollyRoger
force attack.
-
cn3m[m]
128bit AES is insanely overkill still imo
-
cn3m[m]
it would need a flaw in the spec and an almost physically impossible quantum computer
-
cn3m[m]
to get through that AES 256
-
youpie12
thats what i mean with bats and rats we will discover the quantum pc and stuff and eventually get in all data in a completely data rich wor;ld
-
cn3m[m]
most crypto is highly quantum resistant at this point
-
youpie12
Yes and smoking cigarettes was considered healthy
-
youpie12
once a time
-
TheJollyRoger
youpie12 what are you trying to get us to say?
-
TheJollyRoger
I'm going to be frank here: what do you want to hear?
-
youpie12
Nothing just sharing my not so important opinion
-
cn3m[m]
there is really no better option(maybe marginally the secure enclave), but overall Titan M is basically our best option
-
TheJollyRoger
What cn3m[m] said. If you start to bog yourself down in "what could happen" you're honestly never going to be satisfied. Security is a complex and nuanced topic, and simple answers to complex and nuanced topics don't tend to get you very far outside of giving you a warm and fuzzy feeling.
-
youpie12
No i'm just sharing my opinion as in i dont think that we know enough now to be sure to not be able to not get hacked in 5 or 10 years. Overall i'm already satisfied with the answer that cellebrite cant get in the fking phone more than that i dont have any top nasa secret terrorist information
-
youpie12
And i dont think my ''attacker'' would wanna spend more than 5k 10k to get in my phone
-
youpie12
So for me i'm safe for what it is now
-
TheJollyRoger
Of course.
-
TheJollyRoger
Well, in three years, the Pixel 4 will end its support. What I would probably do then, would be to transfer all your data off to cold storage or back it up, then factory reset your phone once it becomes what we call a "pop tart."
-
youpie12
I certanily only use it for chatting
-
youpie12
No specific data as photos or hwat
-
youpie12
what
-
TheJollyRoger
At that point, you can recycle it, or you can keep it as a souvenir.
-
youpie12
Buut even with end of support
-
youpie12
Will the chipset not be safe
-
TheJollyRoger
We call old phones that are no longer supported "pop tarts" because they're useful for supplying energy, but not much else.
-
TheJollyRoger
Kind of like how actual Kellog Pop Tarts are good at supplying calories, but they're about as nutricious as a slice of cardboard otherwise.
-
youpie12
Well they add
-
youpie12
Vitamins to it
-
youpie12
Vitamin powder ;)
-
TheJollyRoger
Ha! That's funny actually, I didn't know that XD
-
youpie12
I didnt know either but recently saw
-
youpie12
All these vitamins
-
TheJollyRoger
That's hilarious.
-
youpie12
But i dont think that my cholocate
-
youpie12
breakfast
-
youpie12
is helping me
-
TheJollyRoger
Ack XD
-
zugzwang[m]
<cn3m[m] "youpie12: they can't get into iO"> Its best to think that they can get into iphones or pixels. Cellebrite or Nso may have an os exploit to disable the delay timer.so the advice should be to use alphanumeric password cos i dont think the 4 digit passw is safe.
-
cn3m[m]
<zugzwang[m] "Its best to think that they can "> the exploits they use is just attacking the OS so they bypass the lockscreen
-
cn3m[m]
USB restricted mode on iOS and GrapheneOS are very effective
-
youpie12
Anyone in here who uses some app cloner app that works everytime? Shelter doesnt wanna do the trick
-
zugzwang[m]
<youpie12 "Anyone in here who uses some app"> There is a fork of island i read on github
-
zugzwang[m]
Island is like shelter
-
youpie12
-
youpie12
this one?
-
riotuser1993[m]
<cn3m[m] "USB restricted mode on iOS and G"> Apparently having to press enter once your password is ready rather than it automatically taking it once the correct amount of characters are entered is a big help as well
-
zugzwang[m]
<cn3m[m] "the exploits they use is just at"> Still alphanumeric password is safer to use
-
zugzwang[m]
Thats island
-
zugzwang[m]
But there is a fork of it i cant seem to remember the name of it now
-
zugzwang[m]
The fork is maintained
-
zugzwang[m]
<riotuser1993[m] "Apparently having to press enter"> Not on ios
-
cn3m[m]
<zugzwang[m] "But there is a fork of it i cant"> Shelter
-
cn3m[m]
<zugzwang[m] "Still alphanumeric password is s"> sure
-
youpie12
I downloaded shelter from aurora store
-
youpie12
Might that cause problem
-
youpie12
doesnt wanna start up after restarting
-
zugzwang[m]
<youpie12 "I downloaded shelter from aurora"> Insular is the name of island fork
-
youpie12
Thankyou will try now
-
zugzwang[m]
<zugzwang[m] "Insular is the name of island fo"> Shelter from fdroid should work fine. Uninstall the aurora one and try the fdroid
-
youpie12
Download from apk online?
-
youpie12
Alrihgt
-
youpie12
will do now thanks
-
youpie12
Cant seem to remove
-
youpie12
Shelter
-
youpie12
Uninstall is greyed out
-
youpie12
Can remove any othe app even the aurora store itself
-
zugzwang[m]
<youpie12 "Uninstall is greyed out"> Cant uninstall from settings?
-
youpie12
Nope but was able via aurora app
-
youpie12
Think because of sandbox>?
-
zugzwang[m]
<youpie12 "Download from apk online?"> Download it from fdroid
-
zugzwang[m]
It should work
-
zugzwang[m]
Sometimes you have to force close it when adding app into shelter
-
youpie12
cant install because of unknownb error says fdroid
-
youpie12
i restart sec
-
zugzwang[m]
youpie12: best to use user profiles though rather than shelter
-
youpie12
I have 3 telegram acounts
-
youpie12
Is hard to switch
-
youpie12
And 3 whatsapp
-
zugzwang[m]
Lol
-
youpie12
Yeah.. using app cloner on my prior android was easier
-
zugzwang[m]
Shelter is easy and works fine on graphene
-
youpie12
Still doesnt wanna install from f droid store
-
youpie12
Says unknown error while installing
-
youpie12
Is there an apk availabel
-
zugzwang[m]
Just sometimes have to force close it when its not sheltering apps
-
zugzwang[m]
Have you installed on another profile shelter aswell?
-
youpie12
Haveno other profiles i know of
-
zugzwang[m]
Have you uninstalled it or just removed it from the homescreen
-
youpie12
I went fdroid types in shelter
-
youpie12
It found the shelter i installed from aurora
-
youpie12
clikced uninstall
-
youpie12
And restarted phone now click install
-
youpie12
Still says unknown error
-
youpie12
First time using f droid
-
zugzwang[m]
Ok, when you used it from aurora
-
youpie12
yees
-
zugzwang[m]
What was the prbl
-
zugzwang[m]
How wasnt functioning
-
youpie12
app started
-
youpie12
havent tried using 2 whatsapp
-
youpie12
but the app worked
-
youpie12
but after restrating
-
youpie12
app wouldnt open
-
youpie12
i had to reinstall
-
youpie12
from aurora
-
zugzwang[m]
Which app wouldnt open shelter or the cloned app
-
youpie12
shelter itself
-
youpie12
havent tried cloning any app yet
-
zugzwang[m]
Hmm strange
-
zugzwang[m]
Working fine for me
-
youpie12
apk from site wouldnt install
-
zugzwang[m]
Even from aurora should work as its the same one as from google play
-
youpie12
Is there any way to see f droid errors
-
zugzwang[m]
I know its stupid but Check under the all apps settingst to see if you havent uninstalled it cos sometimes
-
youpie12
yeah im stupid
-
youpie12
but still uninstall is greyed out
-
youpie12
it is gone from my app list
-
youpie12
thats not in settings
-
zugzwang[m]
youpie12: i said its stupid for me to suggest that cos sometimes i just remove apps from screen thinking i uninstalled them
-
youpie12
i couldnt uninstall from settings
-
youpie12
but i uninsylled via fdroid so thought
-
youpie12
now ist gone from ap pscreen
-
zugzwang[m]
What you mean STILL greyed out
-
zugzwang[m]
You said you uninstalled it from aurora store
-
youpie12
No if i go to settings
-
youpie12
then apps and
-
youpie12
shelter
-
youpie12
the button uninstall it not possibel to click
-
youpie12
greyed out
-
youpie12
Yes uninstalled from store but its apparently
-
youpie12
still in
-
youpie12
settigns
-
youpie12
even after restart
-
zugzwang[m]
So you havent uninstalled it thats why you cant install it from fdroid
-
youpie12
yep
-
zugzwang[m]
Thats why the error on fdroid
-
youpie12
yes im trying to find my way to uninstall it restarting phone again
-
zugzwang[m]
Its nit recommended here adb but thats the only option to uninstall if its a corrupt install i think
-
zugzwang[m]
Someone else can advise better if they know
-
youpie12
when i iinstalled shelter it said if you use any custom rom you should click quit the app but i continued to click conttinue
-
youpie12
might also be a reason for the issue
-
zugzwang[m]
No its not that
-
youpie12
As multiple people said shel;ter worked on grapehneos i though
-
zugzwang[m]
It does
-
zugzwang[m]
But under the apps notifications all apps and still cant uninstall?
-
zugzwang[m]
Even drag to uninstall
-
iocontr0l[m]
you need to remove it as an administrator first of all if you have enabled it.
-
iocontr0l[m]
Then you need to goto serttings and remove work profile
-
iocontr0l[m]
then and only then will Shelter uninstall
-
youpie12
That did the trick
-
youpie12
Now installing it again from fdroid
-
youpie12
Creating new work profile
-
youpie12
shelter is running but no main screen
-
youpie12
It is supposed to be like that
-
anupritaisno1[m]
cdesai
-
anupritaisno1[m]
Think you could help me get a device to support android-prepare-vendor?
-
cdesai
Sure, should just work as long as you can feed it a factory image, there's an option to give a path to the image and skip download
-
cdesai
But why? I'd justt use lineage extract tools
-
anupritaisno1[m]
cdesai (@freenode_cdesai:matrix.org): lineage extract tools do firmware?
-
cdesai
Not extraction afaik, but this doesn't do anything special for that either really.
-
cdesai
Worth checking gerrit if you don't see it in the source.
-
LinusSexTips[m]
Why would you want use Shelter?
-
LinusSexTips[m]
I just make new user profiles
-
cn3m[m]
<LinusSexTips[m] "I just make new user profiles "> that is much more robust
-
cn3m[m]
especially if you reboot before switching profiles
-
cn3m[m]
then you have an anti cold boot attack and AFU attack on the other profiles
-
LinusSexTips[m]
I usually reboot after switching. Is it better to do it before?
-
LinusSexTips[m]
Oh sorry it lagged just saw the last line you sent
-
anupritaisno1[m]
Don't use shelter
-
anupritaisno1[m]
Use island
-
cn3m[m]
<LinusSexTips[m] "I usually reboot after switching"> yeah even if you get exploited in one profile it can't jump like it normally would
-
cn3m[m]
multiple user profiles and rebooting before and after switching is ideal
-
LinusSexTips[m]
OK I will start rebooting before as well. Phone is pretty quick actually doesn't take long
-
strcat[m]
cdesai: maybe we can alter the build system to make an apk
-
strcat[m]
instead of an app bundle
-
cdesai
strcat[m]: it has been app bundle ever since trichrome launched right
-
cdesai
I can/will look into this tomorrow
-
strcat[m]
cdesai: yeah but we can prob generate apk instead
-
strcat[m]
like monochrome and the other targets
-
cdesai
Yeah good idea
-
strcat[m]
might be simple, dunno
-
strcat[m]
a lot of the build system is shared
-
strcat[m]
might be simpler than it seems to do apk
-
strcat[m]
most is templated
-
broda721[m]
<cn3m[m] "multiple user profiles and reboo"> What are the implications if you dont reboot at all between switching user profiles? Does that make it significantly les secure? Lets say you have a main user, and a certain app you want seperated (like facebook). Does not rebooting before switching profiles undo/affect the isolation? Or is the rebooting mainly for physical risks. I have not found instructions on how to go
-
broda721[m]
about user profile switching on the site/reddit
-
zugzwang[m]
<broda721[m] "What are the implications if you"> I would think it has to do with logging off the profile so apps dont run on background after you switch profiles
-
dazinism
-
anupritaisno1[m]
cdesai:
-
dazinism
<anupritaisno1[m] "Don't use shelter "> The shelter dev is working on it again. They got a test build out of the next release.
-
dazinism
Thinking they'll probably be addressing the issues they talked to you about?
-
dazinism
They also working on a new matrix client
-
dazinism
*they got a release candidate out
-
anupritaisno1[m]
Peter is?
-
dazinism
anupritaisno1: yeah, they also got a matrix room for shelter now...
-
anupritaisno1[m]
Send the link
-
anupritaisno1[m]
I know him
-
dazinism
#shelter:neo.angry.im
-
dazinism
cn3m: thinking the AFU worries are addressed if apps keep data encrypted with Titan when screen is locked?
-
dazinism
Pity not many do. Seen password stores and OTP apps
-
dazinism
Be nice to have other apps notes, contacts....
-
cn3m[m]
<dazinism "cn3m: thinking the AFU worries a"> well if the key is in memory that is the issue
-
cn3m[m]
there is nothing stopping you from fully owning and dumping a phone if you can exploit it while logged in
-
dazinism
-
dazinism
This is done by titan
-
cn3m[m]
dazinism: thanks