this post was submitted on 31 Oct 2023
85 points (96.7% liked)
Privacy
31942 readers
591 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
And and what happens to your data if your phone gets stolen?
Doesn't Android have file based encryption by default since a while now?
That means shit, if someone can compromise your bootloader in an hotel or some other public place then they'll get to your data either way once you turn on the phone. This is one very small and very important detail that all those tech youtubers pro-privacy, security and whatnot love to ignore as it is the really hard one that makes all the difference.
Secure boot is a complex subject and it requires a lot of work and checks to make sure nobody tempered with your device and Graphene / Pixel are the ones that really give a shit about that (except for Apple that wants to block jailbreaking and pirated Chinese app stores at all costs).
I never really understood how this kind of attack happens. Can it simply be done in any phone? What are the required conditions?
This is the classic "evil maid attack" applied to phones instead of laptops.
Where is GrapheneOS securing millions of dollars from to buy Cellebrite kits that Israel government only sells to governments and contractors? Or are they lying? Because they lie everywhere on the internet to manufacture myths so they can later quote themselves as the source of "truth". https://i.imgur.com/woNxPhx.jpg
Didn't they get some grant from twitter or something like that? Cuz calyxos did get a million dollar grant last year from that jak dorsie guy.
Ah I see, does that mean that in terms of security, switching to another ROM on a phone with non re-lockable bootloader is a downgrade from the stock ROM?
It depends on your goal. If you plan to have any kind of boot / data security and the device can't be re-locked with an alternative ROM you're essentially better with the stock ROM in a locked state.
Now that's kind of personal choice, I believe the instant damage done by someone stealing your phone and getting your data (because your bootloader was unlocked) is considerably larger than the privacy implications of running the stock / vendor Android. For what's worth if you can root your stock Android and firewall everything that seems suspicious it might be better than running an alternative ROM without a secure boot. Even with an alternative ROM you can run into privacy issues, take for example here CalyxOS running on Qualcomm CPUs. What's interesting here is that this issue doesn't happen in Graphene because they're actually better at covering all grounds than CalyxOS and others seem to be.
Don't you think it's easier, due to inattention when installing a compromised app, a privilege escalation attack through root or actually an invasion due to the amount of bloatware from companies that take their piece of the pie in the Stock ROM (even though they do would cleaning via ADB) and even worse rooted to block these suspicious traffic be something more harmful for the user?
Because the ability to steal the decryption password in RAM memory due to the unlocked bootloader is a little less likely for the thief to have.
I use LineageOS and I feel much better, since my cell phone is Xiaomi, than using MIUI, which is from a chinese big tech company and has proprietary code.
The attack you're describing is a typical automated thing where hackers are exploiting dozens of devices in some automated fashion, that can happen but the damage is different. They might get your data but that's usually sold on the black market in a bundle of compromised data. It will take some time for the info to get sold and for the buyer to act on it and sometimes it may never act - after all you're one compromised device among millions. Even if the buyer it's more likely he'll simply use your device in a botnet to fake clicks on ads or DDoS something and profit that way. The key aspect of those attacks is that you've time to flag suspicious activity and act.
However if you carry an unlocked phone and someone steals that from you there's a very high chance that it isn't a random burglary, according to statistics most burglaries are committed by someone who knows victim aka is targeting you specifically. If you're targeted by someone or some entity they'll want your data and accounts and they'll have the time, resources and attention focuses towards you giving you little to no time to react. This is why I would NEVER use a phone without a secure bootloader.
Tell you what: I agree with you on this. If one is truly paranoid and takes physical security into account, a rooted stock OS is a far better option in terms of restricting access to system files (not saying the CIA/MOSSAD can't do it, but your random reddit-informed script kiddie definitely can't). Indeed, rooting your stock OS, firewalling everything and deleting telemetry might be a decent idea (there are ways to install security patches on rooted mobiles, not to worry).
Edit: on the matter of CalyxOS, I wouldn't go as far as to fault them on it. Grapehene has taken a resolution to either block/use their own almanac servers. This requires a fair bit of work. Oh, and what domain do Google chips use for almanacs anyway?
Yes, but if you want sell a secure OS to people it should be really secure and not have big blind spots hidden from the users like this one.
One could argue about funding/interest when there are other things to fix. Essentially, when someone develops FOSS, people don't get to order them around on what to do. I'm very pleased with what Calyx and Graphene have achieved till date and support them wholeheartedly (speaking of which, I should get back to donating, money is a bit tight though). But yes, perhaps a disclaimer for the paranoid people on Calyx's website could be a decent idea.
It isn't about being paranoid. It's about knowing where you're stepping, not everyone has time / can do proper research and I'm sure there are people running Calyx / others that aren't aware of that boot security issue and if they were they wouldn't be using it.
Look those projects are great as you said and I'm very grateful they exist but people should know what they're "buying into" when it comes to security and privacy.
I think the industry/market generally realises that Graphene is the most secure Android OS there is. I'm interested in trying to understand how they implemented locking the bootloader and why other ROMs aren't picking this up yet. Maybe it's just a lot of work.
I think people who go on to flash Calyx definitely know the advantages of locking one's bootloader and that using Calyx doesn't let you do that. I think ROMs such as these also explicitly mention that the bootloader cannot be locked once said ROM is installed. I understand if someone doesn't have the time but if they had enough time to understand how to flash a ROM on their mobile one would think they'd be interested in such details too (well, if they aren't, then they likely don't care).
From what I know it isn't only about "a lot of work" its about phone vendors having to support that in the first place.
From what I see in this post and others doesn't seem like it. Seems like a lot of people are unaware of this issue.
Bootloader is relocked after flashing Calyx on an FP4. Are you saying that isn't actually the case?
That's only possible on a small subset of devices and I actually remember that even for the FP4 they said in some devices it doesn't work due to some bug and may lead to a bricked phone.
Ok. My understanding is that Calyx only supports devices that allows relocking, which essentially means Pixels, FP4 and some Shift-device (according to their documentation). So I become a bit confused when it is claimed that it cannot be done at all in Calyx, and that this is some big truth that its users (me included) are not privvy to.
https://calyxos.org/docs/guide/device-support/
It can be installed in other phones besides those that can be relocked. I guess you're referring to actual "official support". Anyway the "rant" (https://lemmy.world/comment/4965517) was more about other ROMs, not specifically Calyx as they are indeed one of the better options.
Thanks for the info! I agree, without being able to outright change phone, you can only choose your tradeoffs
Exactly.
I'll be sad about that, but neither can I afford a new phone, nor would it be sustainable to buy one
Brazilian here, used to people being robbed all the time:
Almost 100% of the time, robbers just want quick cash, ant they will either 1: steal the phone and try to sell it (most robberies simply fall into this first category) or 2: point you a gun and force you to unlock the phone in order to 2a: force you to transfer money from all your banking apps or 2b: take it unlocked in order to send messages to your contacts asking for money.
Most robbers don't have enough tech skills to even understand what a bootloader is. We live in techy social circles and we tend to think everyone has similar skills, while in reality, most people can barely use their devices. Just to illustrate how low are most people skills, if you format a drive with something like ext4, most of the population will be unable to access it.
The kind of situations where criminals will have high skills tend to be when they target specific people or companies, usually paid by crime lords or rivals. Such scenario is very unlikely to happen to the average joe.
Don't get me wrong here, I'm not saying that security measures are unnecessary. I'm just telling how most criminals operate around here, and highlighting how we tend to overestimate people's tech skills.
I'm in the same boat as you. Totally agree!