• 1 Post
  • 137 Comments
Joined 10 months ago
cake
Cake day: June 3rd, 2025

help-circle





  • They’re two sides of the same coin. Can’t have privacy without security and can’t have security without privacy.

    Hmmm… I half agree with what you said. The corner stone of most security is an element of initial trust.

    With SSL, we’re trusting that the certificate authority is valid.

    With tools like GPG, I (as the sender) are trusting that the key I’m using to sign a message is really yours.

    With Android we (the users) and the application developers are trusting Google (hence why “sideloading” is now “bad”, because Google says it is).

    I absolutely agree that privacy cannot exist without security. But, your privacy is dependent on who your security model trusts.

    I don’t trust Google with my privacy (hence, I degoogle) , but my bank app doesn’t trust my security (hence, the app can only be installed via Google Play).

    So, privacy is dependent on security, but security is built on trust.


  • To expand on this a bit:

    It’s all built on top of the concept of “a chain of trust”, starting at the hardware level.

    (as mentioned) TPM is a chip that’ll store encryption keys at a hardware level and retrieval of these keys can only happen if the hardware is unmodified.

    I assume that part of this key is derived from aspects of your OS (ie: all device drivers are signed by MS).

    The OS will fetch this key, if it’s valid - the OS knows that the hardware is untampered, it can then verify that the OS is unmodified, which can then be used by application to determine that their not modified, etc.

    Now you could spoof your own TPM chip (similar to how Switch 1’s are chipped/nodded), but the deal-breaker is that when you add your key to the TPM chip, you sign it with a hardware vendor specific public key. And that vendor private key is baked into the hardware (often into the CPU, so the private key never crosses the hardware bus).








  • While the BitTorrent angle is not new, the authors previously only included a ‘distribution’ claim based on direct copyright infringement. This claim has a higher evidence standard, as it typically requires evidence that the infringer shares a whole work with a third party.

    Since BitTorrent transfers break up files into smaller chunks before they are shared, it might be difficult to prove that a whole work is shared.

    If the case sides with Meta, I can see future defenses pouring in “Ya, see your honor - I’m innocent cause I only seeded 99.99% of that movie.”



  • I do use a (modded) version of graphene as a daily driver and I do appreciate many of the features that it offer.

    And I totally agree that some people seem to try to turn graphene into some rigid cult (especially on the philosophy of running root and “who decides how application backup should be made? The application developer or the device/data owner”)

    That said:

    the idea that the only way I can not get assraped on the reg is to give a shitload of money to google and then use this elitist OS is something I have a gigantic problem with.

    There is actually a technical reason for this. Pixel phones are the only ones to support custom AvB keys.

    Basically, this allows you (or graphene) to create a key, which can be used to sign your custom firmware. So, you can have a locked bootloader that will only allow OS updates signed with your key.

    You can basically create your own OTA updates. It’s fantastic.

    It’s amazing and disappointing that most phone manufacturers don’t allow custom AvB keys, but it’s a reflection of how they truly don’t care about people who like to tinker.

    Now, should the lack of custom AvB keys be a barrier towards using graphene? Tbh, I don’t think so - but it does fit the graphene rigid MO of “root is bad”.

    edit : fixed link