I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?

  • boredsquirrel (he)@slrpnk.net
    link
    fedilink
    arrow-up
    1
    ·
    19 hours ago

    I have tested an S9 and it was full of preinstalled malware. No recent one but there is no reason to believe things have changed.

    The USB port is disabled if water gets in. GrapheneOS used the feature to allow users to turn it off, always or while locked. That is actual security and it doesnt break the device it users want to use other (open source) operating systems on them.

    LTE-only is relevant because 2G and 3G are insecure. They were part of the attack chain used by governments to install the Pegasus Spyware on phones, along with browsers allowing HTTP traffic and more things that are dealt with by GrapheneOS.

    Google has implemented very few of their features to work on regular Android, riddled with proprietary spyware.

    Dont forget

    • your sources are really old
    • they are very vague
    • Samsungs mechanism is a middle finger for user freedom, that is well known and a reason why GrapheneOS cant support their devices
    • if your phone has Meta spyware, samsung spyware, microsoft spyware and google spyware preinstalled, “military grade” (which translates to “good enough and cheap”) is not relevant at all