aa1

joined 2 years ago
[–] aa1@lemm.ee -1 points 1 year ago

That work was not available when GrapheneOS was developed

What do you mean ? This has nothing to do with GrapheneOS in the first place (which by the way has been created in 2014. The article i linked refers to 2021).

I still consider it a black box.

Reverse engineering is a thing. It always has been. If every piece of closed source was a blackbox how can you explain exploitation ? How can bad actors exploit Windows, MacOS, CPU firmware and so on ? Your argument here is not practical. Also, why should Google put a backdoor inside a chip ? They already get every information they what directly from the people agreeing to use their software. So, why bother ? Moreover, every phone on the market has closed source firmware.

[–] aa1@lemm.ee 15 points 1 year ago (3 children)

The Titan security chip is not a black box. The Titan M1 gas been scrutinazed by blackhat: https://dl.acm.org/doi/fullHtml/10.1145/3503921.3503922

Just because something is not open source does not mean you can't verify it (no, i'm not shilling closed slurce; no i don't think closed > open; no i don't think closed source is more secure)

[–] aa1@lemm.ee 1 points 2 years ago* (last edited 2 years ago)

Luckily GrapheneOS has a duress passowrd feature. Very useful for these situatuons!

[–] aa1@lemm.ee 1 points 2 years ago

GrapheneOS!

view more: next ›