• 1 Post
  • 19 Comments
Joined 2 months ago
cake
Cake day: May 8th, 2025

help-circle

  • the codebase itself? besides XNU, nobody… but, given the immense amount of scrutiny placed on the software, if there was some magic backdoor (an intentional one, anyway, not talking about like NSO group RCEs 'n shit), don’t you think we’d know?

    the average person doesn’t even know what grapheneos is. if they’re either going to buy an iphone, or some generic android phone running a vendor kernel that hasn’t been patched this administration, i’d want them to buy the iphone.














  • fellow u-console owner! i have the a-06. the modem is shite, in my experience. i can’t say for sure but i’d guess it’s arm. the pinephone (pro) uses the eg25-g (as i discuss in the article), which runs an android bootloader, older linux kernel, and generic gnu(?) userland. the bootloader, kernel, and userland are all FOSS (well, they can be flashed to be, anyway). the ADSP (the code that directly interfaces with the radios) is proprietary, for practical and regulatory reasons. this doesn’t really effect my threat model, as i assume that anything a sophisticated attacker could glean from an ADSP backdoor they could much more easily glean through the radio traffic itself. the TZ (arm trustzone) firmware is also proprietary, for technical reasons. iirc it’s signed by ARM, but this is just off the top of my head, so don’t quote me! or do, i’m not your dad…