• General
  • Help deciding between 2 phones

spring-onion However if an attacker has compromised the system to a degree where they have unsolicited access to your camera and microphone I think it's not far fetched to assume the whole device is a goner by then.

Yes, this is why I wonder if the former Pegas*s engineer would be better at countering that type of attack since he knows their tricks.

But I'm just guessing. Maybe Graphene engineers are just as good at knowing and preventing Pegas*s type tricks.

I also wonder once infected, which OS can then "heal" the phone by expelling Pegas*s type infections.

    K8y

    If you or anyone is familiar with K-iPhone (Kryptall) and can vouch for any effectiveness against Pegas*s type attacks, would love to hear...

      K8y I also wonder once infected, which OS can then "heal" the phone by expelling Pegas*s type infections.

      None. You can use proper equipment and MVT to check for and remove it. But tbh, this is barely a more feasible exercise for a would-be target than deploying the cost-prohibitive malware itself would be for an attacker. Would you know it was even there?

      Pegasus had surely been used long before the Saudis deployed the malware into our collective hearts (it's such a cute name!) following Jamal Khashoggi's murder. However, unless you are a politician...or work for one, are a journalist...or are/were married to one, or heir to the ShamWow fortune or are an otherwise high-value target, why worry? Just maintain your updated machines + software and focus on the more likely (and beatable) threats to you and me such as Alphabet Inc, LexisNexis, Experian, Adobe, etc.

      Edit/Add: forgive the assumptions, btw; I mean no disrespect. Perhaps you do indeed have cause for concern. I hope not. Bc if big bro wants something from you, they'll get it. No phone is secure enough to protect you there.

        K8y putting an iPhone in lockdown mode likely protects against malware such as pegasus.

        • K8y replied to this.

          K8y But I'm just guessing. Maybe Graphene engineers are just as good at knowing and preventing Pegas*s type tricks.

          I mean, see for yourself: https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation

          K8y I also wonder once infected, which OS can then "heal" the phone by expelling Pegas*s type infections.

          That's what verified boot is for, which we of course not only implement correctly, but even improve on. Any such compromise is nuked off your phone by just rebooting it.

          K8y If you or anyone is familiar with K-iPhone (Kryptall) and can vouch for any effectiveness against Pegas*s type attacks, would love to hear...

          There's countless companies and services boasting about their "secure" phones when in reality, behind their flashy marketing filled to the brim with meaningless buzzwords that are merely designed to impress the uninformed, there's very little substance to it. They're profit orientated, making money is their highest priority. I'll make it easy for you: either you get yourself a pixel and put GrapheneOS on it, or you buy an iphone. These are the options, you're welcome.

          sudochmod-R777 if big bro wants something from you, they'll get it. No phone is secure enough to protect you there.

          Well the cellebrite documentation I linked above tells a different story. Nothing is 100% safe, anyone claiming otherwise is taking you for a ride. But you can make it extremely hard to break in.

            locked

            locked putting an iPhone in lockdown mode likely protects against malware such as pegasus.

            For those unfamiliar with iPhones, what's lockdown mode? An extra version of airplane mode?

            • de0u replied to this.

              spring-onion I also wonder once infected, which OS can then "heal" the phone by expelling Pegas*s type infections.

              That's what verified boot is for, which we of course not only implement correctly, but even improve on. Any such compromise is nuked off your phone by just rebooting it.

              K8y If you or anyone is familiar with K-iPhone (Kryptall) and can vouch for any effectiveness against Pegas*s type attacks, would love to hear...

              There's countless companies and services boasting about their "secure" phones when in reality, behind their flashy marketing filled to the brim with meaningless buzzwords that are merely designed to impress the uninformed, there's very little substance to it. They're profit orientated, making money is their highest priority. I'll make it easy for you: either you get yourself a pixel and put GrapheneOS on it, or you buy an iphone. These are the options, you're welcome.

              Love the expertise spunk mix. The thing with iPhone is I have seen too many friends, fam and colleagues have weird things happen with their phones. Like start talking, or writing texts as if the phone responded to a convo. Creepy. And so Kryptall is the only iPhone modification company that modifies iPhones to make them secure. I don't know if it's good or not, just that maybe it's better than regular iPhone which if unmodified seems prone to creepy AI or remote attacks...

              That's what verified boot is for, which we of course not only implement correctly, but even improve on. Any such compromise is nuked off your phone by just rebooting it.

              Do all phones that have verified boot wipe off pegasus type attacks when simply rebooted? The Fairphone has verified boot too I believe. Is it pretty rare for phones to have verified boot?

              • de0u replied to this.

                K8y Kryptall is the only iPhone modification company that modifies iPhones to make them secure.

                So they say! Is there any independent (third-party) review of those claims? Is the source open? Are the owners and developers of the company well-known security people... or even identifiable at all?

                K8y Do all phones that have verified boot wipe off pegasus type attacks when simply rebooted?

                Some attacks -- if the Verified Boot implementation gets the details right.

                K8y The Fairphone has verified boot too I believe.

                At least in the past, a foundational issue was very much not right, allegedly making FP VB essentially nonfunctional: