Cellebrite can apparently extract data from most Pixel phones, unless they're running GrapheneOS.
See full article...
See full article...
They can at least make this a default off toggle in settings like the disable 2g connectivity one.I guess this thread will be the usual bashfest where people just make up things about Android and Google, but there is exactly one and only one reason why Cellebrite can't attack GrapheneOS: GrapheneOS disables the USB port until unlock. I doubt Android would ever enable that because it would be confusing to users.
Let me begin by saying you are not alone, it can often seem that way. There are many of us who still remember what privacy was.I've been giving a lot of thought lately to how it might be possible to avoid the surveillance state ( both commercial and government ), but keep coming up with a blank.
How do you organize resistance to authority if every move you make, word you speak, route you travel and message you write is collected, transcribed, databased, indexed and searchable?
The point I always make is - which government?I've been giving a lot of thought lately to how it might be possible to avoid the surveillance state ( both commercial and government ), but keep coming up with a blank.
I'm going to repeat what I said to you in reply: who is making this mythical operating system free from any nefarious corporate interest? Where is the money coming from the fund what will be a very large undertaking?I'm gonna repeat what I said earlier, about another story:
So: raw sewage continues to dribble down the slopes of Mt Google.
We need an Android replacement that is 100% free of Google (and of Apple), and we need it soon.
That was last week, lolWhen i read the headline i thought my my screen pixels can be hacked?
They are wanting something to compete against them, like Blackberry (RIM giving their decryption keys to the RCMP wasn't known to most people, and they fought back against decrypting for other countries, at least publicly), or like Blackphone with PrivatOS that Silent Circle used to sell, but for mainstream consumers.I'm going to repeat what I said to you in reply: who is making this mythical operating system free from any nefarious corporate interest? Where is the money coming from the fund what will be a very large undertaking?
We can't even get Firefox without Google throwing a half billion dollars their way.
Arab Spring would like a word...it's wild that people think that they're going to start the next revolution on facebook. Holy moly, that's just giving free info to whatever the next version of the SS will be. People need to use their damn heads.
The scenario I worry about is that expert consumers start spreading the expectation that average consumers should have to flash a custom firmware onto their phones to deserve privacy.The scenario I worry about is that hardware makers add a firmware-level backdoor into something like bluetooth, the 5g modem, or wifi and then it doesn't matter what OS you flash onto the device. . .
This is the biggest problem today, and unfortunately peripheral device firmware is also the least likely area for GrapheneOS to make an impact.The scenario I worry about is that hardware makers add a firmware-level backdoor into something like bluetooth, the 5g modem, or wifi and then it doesn't matter what OS you flash onto the device. . .
I get that they want some magical third party to step in. I also want a pony. I'm just trying to look at the reality of where that would come from. If that's your goal, it's just not looking achievable. Just repeatedly calling for it doesn't do any good.They are wanting something to compete against them, like Blackberry (RIM giving their decryption keys to the RCMP wasn't known to most people, and they fought back against decrypting for other countries, at least publicly), or like Blackphone with PrivatOS that Silent Circle used to sell, but for mainstream consumers.
Reading this article, there are a number of flaws, mainly, who is vulnerable. While everyone certain can be, so can the sky be clear blue or cloudy. After some additional research in this matter, here is the real breakdown.
For normal users, Google’s default Pixel security is already among the best on the market. Cellebrite tools are designed for law enforcement and require physical possession of the device, plus specialized equipment and legal authorization (a warrant, in most countries). These tools are not accessible to the public or typical hackers.
So unless someone physically has your phone and is a trained forensics analyst,
GrapheneOS is a very small start, but it is still 100% dependent on Google Pixel hardware, which means it's NOT free of Google and it exists only so long as Google doesn't feel threatened too much by GrapheneOS. Once they do, you can bet your behind that they'll start using every dirty trick they can think of to make installing and supporting an alternate OS on the hardware as difficult as possible.As mentioned in this very article, you already have one, it's just a bit DIY: https://grapheneos.org/.
If you mean a default mass market replacement, well, that's not happening any time soon.
Signal requires my phone number to sign up. That makes it, by default, not anonymousLet me begin by saying you are not alone, it can often seem that way. There are many of us who still remember what privacy was.
You need to draw a line in the sand and slowly walk your way back. Start with web browsing, Tor. Move on to communications Signal. Strong arm your friends and family into using it. Then pick your battles, and slowly claw things back.
Here's the hard part for those of us who enjoy our anonymity. You need to go out and meet with the people in your area and educate them why this is bad. And meet with your politicians.
When this spying was only online it was a back and forth game. Now that it has bled into the real world there is no stopping it without changing minds which sadly requires us to step out of the shadows.
I suggest you start by following this YouTuber: https://youtube.com/@rossmanngroup
He has been very informative and has been helping communities to organize.
And finally while you juggle all that, keep on the look out for the next thing to get ahead of it; Digital IDs, IDs required to browse parts of the web, biometric scans to enter/exit the EU. Keep fighting the good fight.
We probably could if the Mozilla foundation pulled it's head out of it's arse and actually made Firefox development a focus instead of... whatever they're doing right now.We can't even get Firefox without Google throwing a half billion dollars their way.
Narrator: Generations later, Google still had no comment...We’ve reached out to Google to inquire about why a custom ROM created by a small non-profit is more resistant to industrial phone hacking than the official Pixel OS. We’ll update this article if Google has anything to say.
It's already here, and has been for some time now....I'm gonna repeat what I said earlier, about another story:
So: raw sewage continues to dribble down the slopes of Mt Google.
We need an Android replacement that is 100% free of Google (and of Apple), and we need it soon.
At the same time plenty of these surveiling organizations take notice when someone has a noticably smaller foot print/signature.I've been giving a lot of thought lately to how it might be possible to avoid the surveillance state ( both commercial and government ), but keep coming up with a blank.
Between control of the hardware, control of the OS, control of the network, control of cloud storage, control of public cameras, neighbors and businesses giving control of private cameras, and control of the radio spectrum I struggle to see how it is possible to conduct your life day-to-day privately.
GrapheneOS seems like a good start. I'm looking at switching, but when I look at the overall picture the challenge seems to be insurmountable.
This is especially troublesome in a world where there are numerous governments sliding into authoritarianism and totalitarianism ( Russia, China........maybe the US? ).
How do you organize resistance to authority if every move you make, word you speak, route you travel and message you write is collected, transcribed, databased, indexed and searchable?
For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.
In completely unrelated news, upcoming versions of Signal will be periodically fetching files to place in app storage. These files are never used for anything inside Signal and never interact with Signal software or data, but they look nice, and aesthetics are important in software. Files will only be returned for accounts that have been active installs for some time already, and only probabilistically in low percentages based on phone number sharding. We have a few different versions of files that we think are aesthetically pleasing, and will iterate through those slowly over time. There is no other significance to these files.
I am impressed that GrapheneOS is popular enough that spying software creators have to take it into consideration.
Yes, that is a very good point - Google should be selling secure phones, and their firmwares should be continuously updated to remain secure. Customers should have a reasonable expectation of privacy.The scenario I worry about is that expert consumers start spreading the expectation that average consumers should have to flash a custom firmware onto their phones to deserve privacy.
iPhones are also cracked by Cellebrite - they can crack all but the latest version of iOS is the latest I've seen.While a nice thing to say, in practice, what does this mean? What exactly are you trying to avoid/accomplish? Who/what are you trying to hide information from?
These questions need to be answered first. At least according to experts, recent Apple phones running recent versions of iOS are, by themselves, very secure. It sounds like recent Pixel phones running GrapheneOS are fairly secure as well. As soon as you start moving beyond the device, though, you have to start trusting entities, and that’s when your threat model matters. Defending against a nation state that’s interested in you personally is different from trying to protect yourself from ad networks or Meta.
https://www.pixnapping.com/When i read the headline i thought my my screen pixels can be hacked?
I think you should hold Google to a higher standard. These things are not difficult to communicate:I guess this thread will be the usual bashfest where people just make up things about Android and Google, but there is exactly one and only one reason why Cellebrite can't attack GrapheneOS: GrapheneOS disables the USB port until unlock. I doubt Android would ever enable that because it would be confusing to users.
iPhones running 17.4 or newer cannot be unlocked by Cellebrite:iPhones are also cracked by Cellebrite - they can crack all but the latest version of iOS is the latest I've seen.
iPhones:
- All iPhone models running iOS 17.4 or newer were labeled as “In Research,” meaning Cellebrite could not unlock them.
- iPhone 12 and newer models running iOS versions 17.1 to 17.3.1 were listed as “Coming soon,” indicating Cellebrite did not have current unlocking capabilities for these devices.
- The entire iPhone 15 lineup, regardless of iOS version, was not exploitable by Cellebrite.
Sort of. Signal requires a phone number. There is nothing stopping you from paying cash for a cheap burner phone and using that device and it's "temporary" number to get the activation code for a Signal account.Signal requires my phone number to sign up. That makes it, by default, not anonymous
I don't think normal users would notice a functional difference. (I thought Android already did that, and had to look up the distinction myself.) The only caveats are USB peripherals like mouse/keyboard/monitor (nice but niche), and Graphene planning* to change their default to not even charge before first unlock, which would be confusing, but makes no difference for Cellebrite protection right now (going by the matching BFU and AFU columns in the table).I guess this thread will be the usual bashfest where people just make up things about Android and Google, but there is exactly one and only one reason why Cellebrite can't attack GrapheneOS: GrapheneOS disables the USB port until unlock. I doubt Android would ever enable that because it would be confusing to users.
Disabling the USB port is far from the only reason why most Android users would find GrapheneOS inconvenient. It is, however, accurate to say that it is far and away the biggest reason Cellebrite can't get in -- although strictly speaking, not the only reason.I guess this thread will be the usual bashfest where people just make up things about Android and Google, but there is exactly one and only one reason why Cellebrite can't attack GrapheneOS: GrapheneOS disables the USB port until unlock. I doubt Android would ever enable that because it would be confusing to users.
Buy a burner in cash? Or use a free throw away SMS. Now Signal offers a user name option you can enable so you aren't discoverable by phone number.Signal requires my phone number to sign up. That makes it, by default, not anonymous
Government censors may block SMS messages from certain services (Russia did it with Telegram and WhatsApp yesterday), which could result in you losing your account.Buy a burner in cash? Or use a free throw away SMS. Now Signal offers a user name option you can enable so you aren't discoverable by phone number.
We are talking the best encrypted communication available, used by spy agencies and politicians to communicate privately. With a little work you can have anonymity too.
We should be encouraging as many people to use it as possible, flood the zone with noise.
I don't know what the Nederlander equivalent of going to Walmart to buy a $20 flip phone and a $20 90-day prepaid cell phone plan is, but—at least in the United States—your anonymity costs about $45 after sales tax. Go down to the local Starbucks-equivalent with your already hardened laptop and set up your fake account and boom, Signal number.Signal requires my phone number to sign up. That makes it, by default, not anonymous
as far as I'm aware, there's no such thing as an anonymous burner in the Netherlands and they all require authentication/activation before they can be used. Even if you buy one anonymously with cash, it won't stay anonymous when it's activatedBuy a burner in cash? Or use a free throw away SMS. Now Signal offers a user name option you can enable so you aren't discoverable by phone number.
We are talking the best encrypted communication available, used by spy agencies and politicians to communicate privately. With a little work you can have anonymity too.
We should be encouraging as many people to use it as possible, flood the zone with noise.
Extremely. If you're using LineageOS then you are almost certainly running with an unlocked bootloader, making attacks like Cellebrite's a lot easier. With physical access to your phone they can load whatever software they like to your phone with no barriers. There are no software-only barriers on Lineage which Cellebrite would be unable to bypass (such as the blocking USB data thing mentioned earlier) just by loading software without the feature. I'm not familiar with GrapheneOS to know if they modified the way encryption worked or anything, but I'm pretty sure LineageOS has not done so, so anything Cellebrite can do with stock OS they'll be able to do with Lineage, and possibly do it easier.I've been running Graphene for about 2 years (currently an 8a) and am absolutely satisfied with it. Unless I missed it there was no mention of Lineage. Is this vulnerable?
Also great if you want to share state secrets with Jeffrey Goldberg, editor-in-chief of The Atlantic!Buy a burner in cash? Or use a free throw away SMS. Now Signal offers a user name option you can enable so you aren't discoverable by phone number.
We are talking the best encrypted communication available, used by spy agencies and politicians to communicate privately. With a little work you can have anonymity too.
We should be encouraging as many people to use it as possible, flood the zone with noise.