TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

GrapheneOS blocked exploitation of 3 Android zero-days used by Cellebrite

132 点作者 akyuu2 个月前

4 条评论

jeroenhd2 个月前
I can&#x27;t imagine Google doesn&#x27;t know about the techniques Graphene employs or how to enable them themselves. What are the downsides to offering these mitigations? Is the performance impact of zeroing freed memory that high? Does offering a setting to block USB devices by default impact the user experience that badly?<p>I kind of want to try GrapheneOS but because unlike other ROMs they care about security and not so much compatibility, most root-avoiding&#x2F;ROM-block-avoiding features just aren&#x27;t available on it.
评论 #43219811 未加载
评论 #43224334 未加载
评论 #43220433 未加载
评论 #43219782 未加载
评论 #43219844 未加载
评论 #43219787 未加载
warabe2 个月前
As a happy GrapheneOS user, I just want to say thank you to the people behind the project.
linwangg2 个月前
[flagged]
评论 #43219711 未加载
评论 #43220796 未加载
osy2 个月前
Until basic features like cloud backup&#x2F;restore[1] works on GrapheneOS, they are irrelevant when talking about sophisticated targeted attacks. Your random journalist uncovering corruption in Saudi Arabia doesn&#x27;t have the time to figure out how to flash a new ROM image, sideload Google apps, etc. GrapheneOS is great for privacy conscious technical users who wishes to use Android. For everyone else, iOS is far more secure OOB than popular Android phones and iOS with Lockdown mode beats GrapheneOS and is a single journo friendly toggle.<p>[1]: <a href="https:&#x2F;&#x2F;discuss.grapheneos.org&#x2F;d&#x2F;15370-restore-from-google-cloud-backup" rel="nofollow">https:&#x2F;&#x2F;discuss.grapheneos.org&#x2F;d&#x2F;15370-restore-from-google-c...</a><p>For all the drones in the replies repeating the same talking point over and over again you fail to address the criticism: GrapheneOS is not usable for non-technical users.<p>Now in terms of security&#x2F;privacy, anyone who is talking about &quot;look at the public exploits&quot; is missing the point because nobody is attacking GrapheneOS for the same reason why nobody attacks macOS. Yes there is some marginal security difference but it&#x27;s mostly because nobody who matters uses it. (I&#x27;m sorry but you, random SV tech worker who knows about GrapheneOS doesn&#x27;t count.)<p>If you want some examples of just a _few_ things iOS does that nobody else does:<p>1. Secure nonvolatile storage[2]: On the most recent iOS devices there is an off chip custom dedicated smart card like device that manages passcode attempts. It&#x27;s set up in a way that even if you completely hack the storage IC + SEP you cannot get any info on the passcode and still need to brute force on device. The only comparable feature is the StrongBox implemented either with an off the shelf SE (huge attack surface) or Titan M on latest Pixel phones which if hacked + TEE hack (also huge attack surface) gains you offline brute force.<p>2. Trusted Execution Monitor[3]: Even if you get kernel data rw access via exploit, you cannot kernel code execution because of hardware locks. You cannot even get EL0 userland execution because of the dedicated TXM which monitors the page tables. The only comparable feature is Samsung Knox which does monitor based page table management but done much worse and is full of holes. Pixel has nothing. Neither of them have any hardware locks on kernel code.<p>3. kalloc_type[4]: in addition to the standard slab based heap isolation that Linux also provides, XNU also promises never to reuse a virtual address for objects of different type completely defeating cross-cache based attacks. Types are also tagged with metadata showing which fields in a struct are pointers and which are numerical data such that the two will never overlap in random cases of slab sharing.<p>There&#x27;s tonnes more but there&#x27;s no point listing them all. As someone who&#x27;ve researched both iOS and Android attacks (and you can ask anyone in the industry who&#x27;ve done the same), iOS security is far ahead. GrapheneOS only provides mitigations that bring Android up to par in many areas (caveat: MTE is coming soon on iOS but is current shipped in a performance regressive way in GrapheneOS and a don&#x27;t-enable-me-but-we-technically-shipped-it developer toggle on Pixels).<p>Also: Android attacks are far and plenty. You don&#x27;t hear about most of them because they&#x27;re not newsworthy because they&#x27;re just dumb vendor bugs and nobody expects Android to be more secure because they don&#x27;t market it that way. If you want a glimpse of what in-the-wilds are publicly disclosed for both iOS and Android, look at P0&#x27;s list[5] especially for recent years (2024-2025).<p>Again none of this matters because the bigger argument is that GrapheneOS is not user friendly and therefore it&#x27;s irrelevant how powerful they defend against the 0.01% attacker who targets specific people.<p>[2]: <a href="https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;security&#x2F;secure-enclave-sec59b0b31ff&#x2F;1&#x2F;web&#x2F;1" rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;security&#x2F;secure-enclave-sec5...</a><p>[3]: <a href="https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;security&#x2F;operating-system-integrity-sec8b776536b&#x2F;1&#x2F;web&#x2F;1" rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;guide&#x2F;security&#x2F;operating-system-in...</a><p>[4]: <a href="https:&#x2F;&#x2F;security.apple.com&#x2F;blog&#x2F;towards-the-next-generation-of-xnu-memory-safety&#x2F;" rel="nofollow">https:&#x2F;&#x2F;security.apple.com&#x2F;blog&#x2F;towards-the-next-generation-...</a><p>[5]: <a href="https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;p&#x2F;0day.html?m=1" rel="nofollow">https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;p&#x2F;0day.html?m=1</a>
评论 #43219842 未加载
评论 #43219707 未加载
评论 #43219766 未加载
评论 #43219769 未加载
评论 #43219710 未加载
评论 #43219793 未加载
评论 #43219685 未加载
评论 #43220204 未加载
评论 #43219798 未加载
评论 #43225025 未加载