I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?
I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?
I have tested an S9 and it was full of preinstalled malware. No recent one but there is no reason to believe things have changed.
The USB port is disabled if water gets in. GrapheneOS used the feature to allow users to turn it off, always or while locked. That is actual security and it doesnt break the device it users want to use other (open source) operating systems on them.
LTE-only is relevant because 2G and 3G are insecure. They were part of the attack chain used by governments to install the Pegasus Spyware on phones, along with browsers allowing HTTP traffic and more things that are dealt with by GrapheneOS.
Google has implemented very few of their features to work on regular Android, riddled with proprietary spyware.
Dont forget