GrapheneOS not only leverages the same hardware-based security features as the OS but implements major hardware-based features unavailable elsewhere.
Hardware memory tagging for production hardening is an exclusive GrapheneOS feature with a best-in-class implementation.
Our USB-C port and pogo pins control feature does hardware-level attack surface reduction with code written for the drivers on each device:
https://grapheneos.org/features#usb-c-port-and-pogo-pins-control
Our Auditor app leverages the pinning-based hardware attestation available on Pixels based on our proposal for it.
Many of our other features are hardware-based, and some of these exist because of features we proposals or helped to secure against weaknesses.
In April, Pixels shipped reset attack protection for firmware based on our proposal, which is not available on other Android devices.
Our initial response to someone asking about them is here, where we were avoided saying more than necessary:
https://x.com/GrapheneOS/status/1804551479484645421
Unplugged followed up with spin and misinformation about GrapheneOS, which we debunked, and then they doubled down on doing even more of it.
@PiereChangstein @weare_unplugged Where do they make any claim about GrapheneOS? It's an ARMv8.2 MediaTek Dimensity 1200 SoC device running a non-hardened fork of the Android Open Source Project. The hardware/firmware doesn't come close to meeting our security requirements, and it's not a hardened OS.
Since they posted huge tweets, we replied with our own huge tweets with inline quotes of everything they wrote for ease of understanding:
1/2:
@weare_unplugged @PiereChangstein > Our goal was to create a phone where privacy is convenient. Flashing GrapheneOS, however, is not something most consumers can do easily. GrapheneOS is very easy to install via https://t.co/29OBsAOaiI and many companies around the world are selling devices with the OS
@weare_unplugged @PiereChangstein > Here are our responses to continue the conversation. What you've done is push more spin and misrepresentations about an open source project to promote your insecure product marketed based on false privacy and security claims. > Let's agree to disagree. While the web installer
@Orca @GrapheneOS @tuneintodetuned Metadata cannot be encrypted. You're mixing things up. Emoji-reactions are not metadata but content.
Oversimplified: Metadata is network data. Required to be readable so a service does work.
Best way to reduce metadata is reduce the network surface, i.e. use a decentralized service. That's why Matrix is better.
All this bizarre reasoning against Matrix. It's getting suspicious tbh. Even though there might be smaller technical details still to fix, centralized services just can't compete.
Also, screw emojis. 😅
@datenritter @GrapheneOS @tuneintodetuned
Metadata is network data.In the context of chat apps, metadata is who you're talking to, when the exchange happens, how long a message it would likely be, and to some extent, what your account is like (like nickname, profile pic and account description).Emoji-reactions are not metadata but content.Best way to reduce metadata is reduce the network surface, i.e. use a decentralized service. That's why Matrix is better.If so, Matrix would be (and is) worse, because the amount of data you can drag from a Matrix server is everything but encrypted chat's content* (except reaction emojis, because it's chat content as you mentioned it), and most people just join matrix.org without hesitation (which means in most cases just dump the db of matrix.org would be enough to figure out most of the connections between users, just like how the ATT metadata leak will impact users that do not use ATT's service). Have you tried login to your account without verifying your client? That amount of data is the amount of data about you that anyone w/ physical/logical access (former being server farm sunpoena, latter being server attacked by adversarials) can extract from the server database.Nicknames/IDs are technically routing information, so we're talking about the same here.
You can't really get rid of this kind of information without messing up your service. (Let's not theorize about random IDs or onion routing here, please.)
You cannot magically "encrypt" it, without making it useless.
A centralized service will have all this data from all it's users, a single server from a decentralized/federated won't. There is no metadata where there is no communication.
The "some matrix server has my metadata" story is misleading.
Do matrix servers pull all metadata from each other? No.
If and only if you communicate with someone on another server, that server will have *some* information.
That's just how networks work. Nothing special.
Compare that to the "who, when, where, how much"-info Signal has. And the "who" in that list refers to real people, because, erm, phone number. 😳
(I like emojis. But minor problems like emoji reactions are out of scope.)
@datenritter @GrapheneOS @tuneintodetuned
Apology for my the last message. I was a little emotional while replying to your last message.

In addition to the end-to-end encryption that protects every Signal message, the Signal service is designed to minimize the data that is retained about Signal users. By design, it does not store a record of your contacts, social graph, conversation list, location, user avatar, user profile name, ...
@Orca Well… I'd expect the phone number to be connected to the account and an IP-address during registration, maybe not by Signal itself but by some three-letter agency. Why is it required in the frst place? Other services don't need it, but it is a 100% perfect personal identifier.
Also, it doesn't matter if a decentralized service has a big main instance. It's still better than a service which is centralized by design - and hosted in the US.
Many "mitigation" methods are nerd porn, but don't mean much in reality. All CIA and NSA have to do is to tell Moxie he's gonna record/copy them metadataz and lie about it or else. You can't check the integrity of their code or their servers.
Decentralization reduces risks and attack surfaces.
@GrapheneOS I think it's a little harsh to call it "not a good private messaging system". There are precious few messaging services to the standard of Matrix or above that have wide capabillities that come close to many non-private, proprietary messengers.
And the few that tick those boxes have huge difficulties irt self-hosting. And afaik none of them have the variety of clients Matrix has, either.
But perhaps I'n being unfair. Maybe it's more accurate to say that Matrix is a good protocol, but not yet satisfactory as an *absolutely* private messenger.
If *absolutely* private is the goal I would be inclined to suggest something else like Briar or Signal - this much is true.
But I think it's plenty servicable for most peoples' - even tech-interested peoples' - standards of privacy in its current state.
@GrapheneOS I see. That's rather unfortunate. I guess I simply give Matrix quite a bit of slack because of how increasingly transfomative it is as a protocol. There's even government contracts involving it.
I hope these problems get resolved as the protocol evolves, but until if/when that comes true, I can see why more rock-solid services like Signal are preferred.
About cryptography issues: https://gist.github.com/soatok/8aef6f67fec9c702f510ee24d19ef92b
About other protocol issues, relevant to why our rooms and others have often gotten bricked: https://telegra.ph/why-not-matrix-08-07
We've learned how to stop our rooms getting bricked for the most part but we've only followed our rules for that for the 4th time we recreated the main room and the 3rd for offtopic after the previous chain state reset incidents. We experienced it in several other rooms but not as recently so we expect those to break.
@GrapheneOS Wow. That's so much worse than I expected. Particularly # 11 of the second link is so laughably unconscionable as a part of basic spec design - it's the type of thing I'd forsee as problematic when I was just starting to learn to code.
And on the security side that simple confidentially break issue is absurd. Wtf.
I had no idea the issues ran this deep, let alone so ludicrously incompetent.
Worse still is the intrinsic problems of the DAG-based system listed there. Not much you can conceptually do about a lot of that without rewriting the basis of the protocol till it's practically a new one.
Well shit. I don't suppose you know of any other batteries-included messaging protocol that's relatively easy to self-host?
@kkarhan PGP/MIME is an extremely flawed way of doing encrypted messaging lacking forward secrecy and robust implementations. It should be avoided.
XMPP + OMEMO is not the worst choice but not one of the better choices either.
None of the end-to-end encrypted messaging apps we're referring to lack self custody of the encryption keys or they wouldn't be E2EE.
@GrapheneOS I have a different assessment, as both #PGG/MIME & #XMPP+#OMEMO have a robust ecosystem of apps and services that support both of them, are self-hosting capable and just work over @torproject / #Tor, #I2P and #VPN without fuss, including hosting the server as an #OnionService.
If i.e. @signalapp / #Signal would actually care, they'd force all traffic on Tor and stop demanding #PII like #PhoneNumbers which in an increasing number of juristictions can't be acquired anonymously by legal means...