GrapheneOS thanks for this explanation. It was informative.

Without question everyone here discussing this subject has misconceptions and lack of knowledge about this. If we didn't we wouldn't be here making posts about it and asking questions. 😌

Anyway thanks for the info. This explanation of yours was satisfactory enough for me not to worry about the subject any more on pixels.

User2288

I don't think a system like that has verified boot, but I don't now.

Possibly it is not only about the ME, what is about a system with old firmware? As far as I know, no OS can be secure on a device if the firmware is the entry point. And many devices don't get long firmware support.

So Im curious about a good laptop option in terms of updates (os and firmware) with good security and privacy. And hopefully good to repair.

I hoped that an old ThinkPad with coreboot/libreboot And QubesOS would be the solution. Quite friendly, they have a good repairability, but unfortunately I don't have enough knowledge about the Intel ME or any possible security concerns in these old devices.

    4 days later
    7 months later

    since the phone processor when powered on problyhas access to the cellular modem, if there is anything like Intel ME built in, the chip if backdoored could request access to the cellular modem, then exfiltrate data through the cellular modem as well as provide a false reading for how much data is being used if OS monitors cellular packets and request that all telcoms do not include any packets going to exf.ilt.rat.e ip address be listed in billing. There would be no way to know. Doesn't it seem likely such a backdoor would be included by design? It would just mean that depending on threat model there could be risk of exfiltration. If threat model is low or mild it wouldnt matter.

    Is this not possible? Intel ME concerns me. I have been hacked on desktop and think it was through ME but do not knows.

      notahuman Please read through the official project account's responses here. There are so many posts where the project account or others have addressed similar worries in other threads too. There just isn't any real reason for Google to hide a backdoor like what you're describing. They'd get caught and there'd be backlash. Google has more than enough access to data via Google Play Services. There's no need for a backdoor.

      I'd also suggest reading a fellow moderator's fantastic response to a similar question here: https://discuss.grapheneos.org/d/10150-not-your-average-why-pixel-thread/7

        other8026 This makes no sense.

        The government could have demanded google create a backdoor in the hardware and issued a gag order.

        Such a backdoor would be useful. Google Play collects and sends data when a user is in the Internet. iIf a user goes into airplane mode the government couldn't track a user easily. If there's a hardware backdoor, they could be able to send a ping to the device to access info about the device even in that mode. There are use cases for it, so why wouldn't the government request? To say it's implausible just seems naive as to how these gag orders work.

          notahuman Hmmmm... I think you're a CCP spy trying to get people off of Google devices and onto chinese devices which you've backdoored in order to spy on them.

          ...see how that works?

          Anybody can make stuff like this up, and we can then debate that made up scenario from there. It is implausible. Pixels are one of the devices with the most security research attention. It sounds like a very silly target for this kind of thing, but even if that's not convincing to you, that's fine, because I don't think anything will really be.

          The logic of "assume backdoor" can literally apply to anything. It's not about being "naive". It's about being realistic.

          notahuman The government could have demanded google create a backdoor in the hardware and issued a gag order.

          In theory, yes... but...

          In theory there is no difference between theory and practice, while in practice there is.
          --Benjamin Brewster, Yale Literary Magazine, February 1882

          The U.S. government could mandate that Google include mass-surveillance backdoors in all of their phones, and could maybe include a gag order. But that sort of argument could cover anything. Way back in 1949 George Orwell wrote a book in which every television was a government surveillance device, which is trivial now (in fact, smart-TV companies have been found doing surveillance for profit). And these days every car could be a surveillance device, and every Wi-Fi access point, and, heck, every automatic paper-towel dispenser in every restroom.

          The problem with sweeping mass-surveillance conspiracies is that when they're big enough they are disclosed. Google ships new phones every year, so does Samsung, so does Apple... keeping something like that a secret, across all of those design teams, year after year, would be a monumental effort.

          People are aware of the Crypto AG compromise, but that worked as well as it did because it was one small company. Even before Snowden made his disclosures, people suspected some of those holes. There are multiple mass-surveillance/public-safety infrastructures in China, but they are so big that everybody knows about them.

          If the NSA, or the FBI, whatever, wants to bug me in particular, and they are willing to spend $50,000 or so, I have to assume they'll be successful. "Retail" (targeted, individual) surveillance generally works. "Wholesale" surveillance can work too, but secret "wholesale" surveillance is a lot harder.

          I don't think it's "naive" to assume that secret wholesale surveillance would be disclosed. Gag orders can work when they are limited in scope, but I think data support the notion that grand sweeping multi-year multi-company gag orders eventually leak.