Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it.

We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
163 Indlæg 47 Posters 0 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

    @lumi These attest keys are meant to be pinned after the initial use and then used to enforce that subsequent attestations have trust chained from the initial verification. As long as the initial key was securely generated in the TEE or secure element and those have not been compromised with exploits then compromised apps or a compromised OS cannot fake the data. It chains trust from an initial starting point and does not limit which hardware or software can be used, the root approach does.

    grapheneos@grapheneos.socialG This user is from outside of this forum
    grapheneos@grapheneos.socialG This user is from outside of this forum
    grapheneos@grapheneos.social
    wrote sidst redigeret af
    #41

    @lumi The pinning-based approach was implemented so that you can verify the initial chain based on the root by enabling attestation for the attest key itself but it doesn't have to be used that way. It can be used to solely provide pinning-based attestation. Our Auditor app uses both but we don't consider root-based attestation to have much value. Any exploit of any TEE or secure element on any Android device that's certified can be used to get keys chaining to a root. It's not a secure system.

    1 Reply Last reply
    0
    • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

      @lumi These attest keys are meant to be pinned after the initial use and then used to enforce that subsequent attestations have trust chained from the initial verification. As long as the initial key was securely generated in the TEE or secure element and those have not been compromised with exploits then compromised apps or a compromised OS cannot fake the data. It chains trust from an initial starting point and does not limit which hardware or software can be used, the root approach does.

      lumi@snug.moeL This user is from outside of this forum
      lumi@snug.moeL This user is from outside of this forum
      lumi@snug.moe
      wrote sidst redigeret af
      #42

      @GrapheneOS oh! that makes sense then. so the app is checking that the system it initially verified on has the same trust as the system it is on right now

      i still don't think it's the app's job to do this, but if people really want this, then heh, i don't really care

      lumi@snug.moeL grapheneos@grapheneos.socialG 2 Replies Last reply
      0
      • lumi@snug.moeL lumi@snug.moe

        @GrapheneOS oh! that makes sense then. so the app is checking that the system it initially verified on has the same trust as the system it is on right now

        i still don't think it's the app's job to do this, but if people really want this, then heh, i don't really care

        lumi@snug.moeL This user is from outside of this forum
        lumi@snug.moeL This user is from outside of this forum
        lumi@snug.moe
        wrote sidst redigeret af
        #43

        @GrapheneOS or, more so, that it is the same system that it initially verified on, and so it will pass initial verification no matter what, even if it's my own build of a rom, or even me using it in an emulator?

        1 Reply Last reply
        0
        • lumi@snug.moeL lumi@snug.moe

          @GrapheneOS oh! that makes sense then. so the app is checking that the system it initially verified on has the same trust as the system it is on right now

          i still don't think it's the app's job to do this, but if people really want this, then heh, i don't really care

          grapheneos@grapheneos.socialG This user is from outside of this forum
          grapheneos@grapheneos.socialG This user is from outside of this forum
          grapheneos@grapheneos.social
          wrote sidst redigeret af
          #44

          @lumi Yes, and the attestation metadata includes certain information set by the OS developers such as the patch level for the OS. As an example of how this can be used, consider 2 people talking to each other on Signal who both want it to be a highly secure conversation. There could be a way to opt-in to sending each other attestations as part of the verification. It could then enforce that it's the same devices talking to each other and that the patch level continues to be updated, etc.

          grapheneos@grapheneos.socialG 1 Reply Last reply
          0
          • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

            @ftm Murena and iodé relentlessly spread false claims about GrapheneOS and our team. That includes personall targeting our team with absolutely vile bullying and harassment.

            Here's the founder and CEO of /e/ and Murena linking to content from a neo-nazi conspiracy site targeting our founder with blatant fabrications including links to harassment content from Kiwi Farms users:

            https://archive.is/SWXPJ
            https://archive.is/n4yTO

            Volla is fully aware of all this but works closely with these groups.

            dekoftheyautja@social.vivaldi.netD This user is from outside of this forum
            dekoftheyautja@social.vivaldi.netD This user is from outside of this forum
            dekoftheyautja@social.vivaldi.net
            wrote sidst redigeret af
            #45

            @GrapheneOS @ftm Ah geeze, here we go again 🤣

            1 Reply Last reply
            0
            • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

              @lumi Yes, and the attestation metadata includes certain information set by the OS developers such as the patch level for the OS. As an example of how this can be used, consider 2 people talking to each other on Signal who both want it to be a highly secure conversation. There could be a way to opt-in to sending each other attestations as part of the verification. It could then enforce that it's the same devices talking to each other and that the patch level continues to be updated, etc.

              grapheneos@grapheneos.socialG This user is from outside of this forum
              grapheneos@grapheneos.socialG This user is from outside of this forum
              grapheneos@grapheneos.social
              wrote sidst redigeret af
              #46

              @lumi As an example, pretend that one of the 2 devices is compromised and the attacker stops allowing security patches. This would be visible in the attestation metadata and the attacker wouldn't be able to fake it without an early boot chain or secure element exploit. It could similarly provide more than it does today such as warning if the device hasn't been rebooted for a certain amount of time. This would all work fine without root-based attestation. Our Auditor app provides this stuff.

              grapheneos@grapheneos.socialG 1 Reply Last reply
              0
              • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                @lumi As an example, pretend that one of the 2 devices is compromised and the attacker stops allowing security patches. This would be visible in the attestation metadata and the attacker wouldn't be able to fake it without an early boot chain or secure element exploit. It could similarly provide more than it does today such as warning if the device hasn't been rebooted for a certain amount of time. This would all work fine without root-based attestation. Our Auditor app provides this stuff.

                grapheneos@grapheneos.socialG This user is from outside of this forum
                grapheneos@grapheneos.socialG This user is from outside of this forum
                grapheneos@grapheneos.social
                wrote sidst redigeret af
                #47

                @lumi Most of the companies using attestation want root-based attestation. They primarily want to use it to control which hardware and software people can use. Useful hardware-based attestation can be provided without enabling apps to do this. It can also be useful without being available to user installed apps but it's not harmful for it to be available to user installed apps if it doesn't provide a root-based system that's inherently anti-competitive. It's even actually very anti-security.

                grapheneos@grapheneos.socialG 1 Reply Last reply
                0
                • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                  @lumi Most of the companies using attestation want root-based attestation. They primarily want to use it to control which hardware and software people can use. Useful hardware-based attestation can be provided without enabling apps to do this. It can also be useful without being available to user installed apps but it's not harmful for it to be available to user installed apps if it doesn't provide a root-based system that's inherently anti-competitive. It's even actually very anti-security.

                  grapheneos@grapheneos.socialG This user is from outside of this forum
                  grapheneos@grapheneos.socialG This user is from outside of this forum
                  grapheneos@grapheneos.social
                  wrote sidst redigeret af
                  #48

                  @lumi Disallowing people using GrapheneOS is anti-security and that's exactly what apps using either the Play Integrity API or Unified Attestation API are going to be doing. Both are going to be allowing extremely insecure options without basic patches and protections but yet not permitting a hardened OS with much better security. As far as we're concerned the whole approach is both fraudulent and violates antitrust law. Fighting Google's influence is hard but fighting this won't be hard.

                  lumi@snug.moeL 1 Reply Last reply
                  0
                  • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                    @lumi Disallowing people using GrapheneOS is anti-security and that's exactly what apps using either the Play Integrity API or Unified Attestation API are going to be doing. Both are going to be allowing extremely insecure options without basic patches and protections but yet not permitting a hardened OS with much better security. As far as we're concerned the whole approach is both fraudulent and violates antitrust law. Fighting Google's influence is hard but fighting this won't be hard.

                    lumi@snug.moeL This user is from outside of this forum
                    lumi@snug.moeL This user is from outside of this forum
                    lumi@snug.moe
                    wrote sidst redigeret af
                    #49

                    @GrapheneOS yeah. in general, security relies on freedom, security without freedom is very sketchy and on an extremely shaky ground

                    people should be able to install whatever they like and be able to use the apps they want, be it grapheneos, another android rom, mobile linux, or whatever else

                    artificial restrictions of what apps you can use are never okay, anything anti-freedom is inherently anti-security

                    1 Reply Last reply
                    0
                    • ftm@todon.euF ftm@todon.eu

                      @GrapheneOS and what exactly is your conflict with volla. I get the iodé and Murena part, but what's wrong with Volla?

                      danieldk@mastodon.socialD This user is from outside of this forum
                      danieldk@mastodon.socialD This user is from outside of this forum
                      danieldk@mastodon.social
                      wrote sidst redigeret af
                      #50

                      @ftm @GrapheneOS it is worth checking Volla's source trees. They use ancient kernels firmware blobs, etc. It's pretty much the same issue as GMS Android, the whole attestation thing becomes security theater if phones with years of known holes get attested.

                      grapheneos@grapheneos.socialG danieldk@mastodon.socialD 2 Replies Last reply
                      0
                      • danieldk@mastodon.socialD danieldk@mastodon.social

                        @ftm @GrapheneOS it is worth checking Volla's source trees. They use ancient kernels firmware blobs, etc. It's pretty much the same issue as GMS Android, the whole attestation thing becomes security theater if phones with years of known holes get attested.

                        grapheneos@grapheneos.socialG This user is from outside of this forum
                        grapheneos@grapheneos.socialG This user is from outside of this forum
                        grapheneos@grapheneos.social
                        wrote sidst redigeret af
                        #51

                        @danieldk @ftm It's inherently security theatre because neither companies and governments are willing to ban using the majority of Android phones which is what would happen if even basic security standards such as keeping up with High and Critical severity patches from AOSP and the SoC / radio vendors was enforced. Instead, they're disallowing people having the freedom to use their hardware or OS of choice while not enforcing even basic security standards. They're disallowing better security.

                        1 Reply Last reply
                        0
                        • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                          Murena and iodé are extremely hostile towards GrapheneOS. They've spent years misleading people about it with inaccurate claims to promote their insecure products. We'll never work with them. Volla, Murena and iodé should have no say in which OS people can use on their devices.

                          grapheneos@grapheneos.socialG This user is from outside of this forum
                          grapheneos@grapheneos.socialG This user is from outside of this forum
                          grapheneos@grapheneos.social
                          wrote sidst redigeret af
                          #52

                          There's no legitimate purpose for either Play Integrity or Unified Attestation to exist. Both will inherently fail to uphold even basic security standards since otherwise their own products wouldn't be allowed. Root-based attestation is also inherently not a secure approach.

                          grapheneos@grapheneos.socialG privacyfriendly@mastodon.socialP 2 Replies Last reply
                          0
                          • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                            We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it. Companies selling phones should not be deciding which operating systems people are allowed to use for apps.

                            https://uattest.net/

                            F This user is from outside of this forum
                            F This user is from outside of this forum
                            firedragon@social.librem.one
                            wrote sidst redigeret af
                            #53

                            @GrapheneOS

                            The Nostr based app store called "Zapstore" has already solved this problem. Zapstore empowers developers to sign and release apps over the Nostr protocol without needing to get permission from any app store or from any governnent or any other entity.

                            The Zapstore already has most of the useful F-Droid apps, and anyone can release more apps.

                            Zapstore.dev

                            1 Reply Last reply
                            0
                            • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                              There's no legitimate purpose for either Play Integrity or Unified Attestation to exist. Both will inherently fail to uphold even basic security standards since otherwise their own products wouldn't be allowed. Root-based attestation is also inherently not a secure approach.

                              grapheneos@grapheneos.socialG This user is from outside of this forum
                              grapheneos@grapheneos.socialG This user is from outside of this forum
                              grapheneos@grapheneos.social
                              wrote sidst redigeret af
                              #54

                              Having a European version of the Play Integrity which permits people to use insecure products from specific European companies participating in it while disallowing using arbitrary hardware or software is the opposite of a solution. It's more of the same anti-competitive garbage.

                              tycoontom@infosec.exchangeT 1 Reply Last reply
                              0
                              • danieldk@mastodon.socialD danieldk@mastodon.social

                                @ftm @GrapheneOS it is worth checking Volla's source trees. They use ancient kernels firmware blobs, etc. It's pretty much the same issue as GMS Android, the whole attestation thing becomes security theater if phones with years of known holes get attested.

                                danieldk@mastodon.socialD This user is from outside of this forum
                                danieldk@mastodon.socialD This user is from outside of this forum
                                danieldk@mastodon.social
                                wrote sidst redigeret af
                                #55

                                @ftm @GrapheneOS Another thing I don't really like about Volla is that they seem to do Eurowashing.

                                Maybe (some part of) the Volla Phone Quintus is assembled in Europe, but the phone seems to be a rebranding of the Daria Bond 5G (stated by multiple sources, including the PostmarketOS wiki) with a markup of ~550 Euro (~160 -> 719 Euro): https://www.amazon.ae/Android-Smartphone-Storage-Octa-Core-Monetization/dp/B0DDYDZC4V?th=1

                                The Daria Bond 5G is sold by an UAE company that also maintains the Volla Phone Quintus source trees (well, 'maintain' is a big word).

                                1 Reply Last reply
                                0
                                • zaire@fedi.absturztau.beZ zaire@fedi.absturztau.be

                                  @eskuero @GrapheneOS

                                  torment nexus

                                  european torment nexus

                                  eskuero@mstdn.ioE This user is from outside of this forum
                                  eskuero@mstdn.ioE This user is from outside of this forum
                                  eskuero@mstdn.io
                                  wrote sidst redigeret af
                                  #56

                                  @zaire wat

                                  1 Reply Last reply
                                  0
                                  • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                    Murena and iodé are extremely hostile towards GrapheneOS. They've spent years misleading people about it with inaccurate claims to promote their insecure products. We'll never work with them. Volla, Murena and iodé should have no say in which OS people can use on their devices.

                                    mrgr@mastodon.socialM This user is from outside of this forum
                                    mrgr@mastodon.socialM This user is from outside of this forum
                                    mrgr@mastodon.social
                                    wrote sidst redigeret af
                                    #57

                                    @GrapheneOS ich erlebe das genauso umgekehrt von euch gegenüber den anderen Custom ROMs. Ihr seid denen nicht weniger feindlich eingestellt wie ihr das von ihnen behauptet.

                                    31113@kolektiva.social3 1 Reply Last reply
                                    0
                                    • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                      We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it. Companies selling phones should not be deciding which operating systems people are allowed to use for apps.

                                      https://uattest.net/

                                      P This user is from outside of this forum
                                      P This user is from outside of this forum
                                      pixelsfanryo@mastodon.social
                                      wrote sidst redigeret af
                                      #58

                                      @GrapheneOS So if Im understanding this correctly, what GOS wants is for apps to use an API that will interface with a hardware chip like the titan m2 and will report that the bootloader is locked etc and also report the signing key to apps? Then it would be up to the app to trust that key (which necessitates an allowlist of sorts maintained by apps individually). Is my understanding correct?

                                      P grapheneos@grapheneos.socialG 2 Replies Last reply
                                      0
                                      • P pixelsfanryo@mastodon.social

                                        @GrapheneOS So if Im understanding this correctly, what GOS wants is for apps to use an API that will interface with a hardware chip like the titan m2 and will report that the bootloader is locked etc and also report the signing key to apps? Then it would be up to the app to trust that key (which necessitates an allowlist of sorts maintained by apps individually). Is my understanding correct?

                                        P This user is from outside of this forum
                                        P This user is from outside of this forum
                                        pixelsfanryo@mastodon.social
                                        wrote sidst redigeret af
                                        #59

                                        @GrapheneOS If that is the case, then IMO uattest is actually better. A CA like uattest, as bad as it sounds, will probably be more amenable to allowing reasonably secure alternative OS like LineageOS. You only need to persuade one entity. While if each app gets to decide then you have to convince each dev, bank, gov to allow your OS. That doesnt sound very practical. And the uattest proposal can be implemented right now on most devices while most devices dont have a security chip at the moment.

                                        grapheneos@grapheneos.socialG 1 Reply Last reply
                                        0
                                        • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                          @dristor Android Open Source Project and GrapheneOS are Linux distributions. GrapheneOS is fully compatible with Android apps and has support for running the vast majority of apps depending on the Play Integrity API. GrapheneOS can run apps for non-Android operating systems via hardware-based virtualization. Hardware-based virtualization support will continue to be fleshed out both for running non-native apps and running Android apps with stronger isolation than the Linux kernel can provide.

                                          P This user is from outside of this forum
                                          P This user is from outside of this forum
                                          paul_stilgar@mastodon.social
                                          wrote sidst redigeret af
                                          #60

                                          @GrapheneOS @dristor

                                          Is it me or grapheneos is only supporters on google pixel models ?
                                          If yes why should we give money to google ?

                                          #grapheneos #android

                                          plym@vmst.ioP 31113@kolektiva.social3 elevenfingers@pdx.socialE 3 Replies Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper