• General
  • What is current GrapheneOS's security strength compared to iPhone circa 2016?

  • [deleted]

Intellectual2
The owner profile would be locked the same way as it would be if you used only one profile.

So if you showed anyone your "decoy" profile, to actually get into the owner profile, you or the person that you are showing it to would need to switch users first and than provide password to the owner profile.

So in this thread we talked about lengthy passwords.
I believe & also someone else commented too about how troublesome it would be to have to remember & to enter that lengthy 90 to 128 bit passphrase every single time one logs in. Here is an idea I've had for a long time, which is to create an encrypted peripheral login shell GUI, that you log into, which uses like a one character or even five character passphrase. Then the 2nd later that you log into, has countless files, of random code, many gigabytes of it, maybe some decoy pdfs also, or txt files or jpg photos, program files,etc.
And you either use a file itself, drag & drop it into the real 90 to 128 bit password box, use the file itself as the passphrase or key, or alternatively you search in this random code files for a searchphrase, like "swordfish7", then that will bring you to a section buried in these millions of lines of random code/gigabytes, & right after that word swordfish7, indented & easily selectable/copy pastable, is a 90 to 128 bit passphrase, and it looks just like the millions of code surrounding it. Its not hiding a needle in a haystack, its hiding a needle in a stack of other needles. This is by far the best way to store passwords I believe, that I know of, but I am not nearly as trained or experienced as any of the experts commenting here.

I also think fingerprint recognition is a bad idea, as this method is particularly vulnerable to some government's legal right to force/order/compel you to provide your fingerprint to unlock, or a non government adversary may use your fingerprint by force. Whereas a password can be forgotten(plausibly deniability), or it can be considered violating The Fifth Amendment right to protection from being compelled to incriminate oneself. The different courts across the US have disagreed with each other about this, but its much better than a fingerprint. The only thing better is plausible deniability with a hidden/decoy LUKS or veracrypted OS, or linux based phone can provide?

Or maybe grapheneOS's decoy profiles offer plausible deniability? is there a way to hide the Owner/real profile? and only show the decoy profile?

    Intellectual2 https://github.com/GrapheneOS/os-issue-tracker/issues/28 This will help with adding an extra layer to fingerprint unlock as a second factor.

    You could have your secure passphrase as the primary unlock method (will need to be used after a reboot etc.) but use a combo of PIN + Fingerprint as a second factor, instead of just fingerprint.

      matchboxbananasynergy Thanks Mr. Banana! :) But what are the benefits of this?
      I see that with a fingerprint, it might make it even more difficult to hack into, a bruteforce approach wouldnt even work with a fingerprint unlock? But is your method quicker? (compared to typing a 90 to 128 bit password) as that is what my last comment was getting at. Not sure what you were replying to, my post, or my last comment. Of course scanning a fingerprint will be quicker, but will it be as secure? how many bits would the secure passphrase be initially for example?

        Intellectual2 You said that a long passphrase is inconvenient. I agree. You have to use it when the phone is in BFU mode (after a reboot), and you can use a fingerprint after that.

        However, you mentioned that fingerprints can be risky if the government can compel you to use your fingerprint to unlock the phone. If your second factor is not just a fingerprint but a combination of both a PIN and a fingerprint, you now have the resilience of an impossible to brute force password for when the phone is in BFU mode (7 word diceware passphrase) as well as a very secure yet easy way to unlock the phone in your everyday usage (6 digit PIN + fingerprint).

        I hope that makes sense. If not, let me know.

          • [deleted]

          matchboxbananasynergy combo of PIN + Fingerprint as a second factor,

          It would be nice to have this option.

          matchboxbananasynergy . If your second factor is not just a fingerprint but a combination of both a PIN and a fingerprint, you now have the resilience of an impossible to brute force password for when the phone is in BFU mode (7 word diceware passphrase) as well as a very secure yet easy way to unlock the phone in your everyday usage (6 digit PIN + fingerprint).

          Independent of PIN+fingerprint as an option, what about having brief fingerprint-only unlocking with a timeout? So I could unlock with just a fingerprint for 90 seconds, then fingerprint & PIN until the reboot timer goes off.

          Does GrapheneOS/Android support unlocking the phone with a hardware key via FIDO2 or similar?

            2 months later
            • [deleted]

            de0u The government phones are less secure than the pixel with grapheneos, but the government communications are.

            • [deleted]

            BIRDIE Of course it's super secure. Even the linux kernel is maintained unlike other systems. No need to watch youtube videos, the GrapheneOS website itself is a bible. When I need information I look at the GOS website or the WHONIX website. Nothing else

            • [deleted]

            BalooRJ It is the titan chip that partly manages the unlocking.

            IMHO a default GrapheneOS install is more secure than default iOS install simply because the former has much less attack surface. The iPhone comes preinstalled with a ton of services through which people can reach the phone and attempt to exploit: imessage, icloud photos, apple music, find my iphone, homekit, calendar invites... Safari the browser is also notoriously easier to exploit than Chromium.

              Titan_M2 iMessage in particular proves to be a common channel for delivering exploits. If you have to use iOS for some reason and have a high threat model, I'd suggest disabling iMessage, Facetime, MMS and not using Mail app. Enable lockdown mode too.

                • [deleted]

                DeletedUser115 I agree, the problem is that in France the lockdown mode has been translated as "isolation mode", which has nothing to do with it. I might as well tell you that when I advised my wife's parents to activate it for their own safety, they didn't want to. So I don't think Apple wants to make any more of an effort than that when it comes to security, and I think that if there's one device you shouldn't buy, it's the iPhone.

                  [deleted] and I think that if there's one device you shouldn't buy, it's the iPhone.

                  I think it depends on your usage and threat model. Average Joe's data is probably more secure on an iphone than on a cheap android phone. There are many more incidents with malware infested apps in the play store compared to Apple's App store. In my experience, old people or less tech savvy people prefer the UX of an iphone. Things just work there, for the better or worse, if you happen to have more than one apple device in your household (Mac, TV, iPad) - AirDrop, screen syncing, sharing wifi password. Almost no configuration required.

                  Sure, then there are the iMessge zero-clicks so disabling that would mitigate the risk.

                  But as with most other online devices, if you keep your sanity and find the strength to resist the urge to play the umpteenth reiteration of some dumbed down mobile game or camera app, I think the average user is golden even with an iphone.

                    • [deleted]

                    Phead In what threat model can you cut corners on safety? No one is safe on an iPhone or Android device, even signal is used by pegasus. The problem is just that: it's Jamal's wife who has been targeted for the murder of her husband. So if there's a potential target in everyone's knowledge, it's a VERY high threat model that needs to be considered. My opinion may seem a little exaggerated, but it's not.

                      [deleted] "Jamal's wife"

                      What? Are you talking about Khashoggi? Please clarify.

                      [deleted]

                      It's your opinion and I'm not trying to convince you otherwise. But many people just want to use their phone for casual day to day business (Facebook, insta, YouTube, you name it). Some of them simply cannot wrap their head around android or the whole concept of privacy and security on the internet, others just don't care because they don't know half of it. For those average users, and I do not mean that in any way to be disrespectful, iphones are a reasonable choice because they are reasonably secure, easy to setup and to use. They have no threat models, no state sponsored agency on their back which tries to infiltrate their devices to collect as much compromising data as possible. I know enough people who just want to use their phone, take pictures, message their friends and family and be done with it. That's how apple got so big, perfect marketing and easy to use devices. They just made their homework.

                      Everybody has different needs and expectations and iphones certainly cater to some of them.