We're happy to announce a long-term partnership with Motorola. We're collaborating on future devices meeting our privacy and security standards with official GrapheneOS support.

https://motorolanews.com/motorola-three-new-b2b-solutions-at-mwc-2026/

Motorola News | Motorola's new partnership with GrapheneOS

Motorola announces three new B2B solutions at MWC 2026, including GrapheneOS partnership, Moto Analytics and more.

Global Blog
@GrapheneOS does this mean i will be able to get a degoogled motorola device in the future?
@lumi @GrapheneOS

TL;DR: Yes.
@lumi @GrapheneOS

Well, as degoogled as using an OS maintained by Google gets
@alexia @GrapheneOS yeah, ofc the end goal is using a proper linux phone, to get maximal freedom and security

but having a degoogled android device is a step along the way. though i have been stuck at that step since around 2014
@lumi @alexia GrapheneOS and the Android Open Source Project are Linux distributions. We strongly disagree with the premise that glibc, systemd and GNOME are preferable to the much more private and secure AOSP software stack. Moving to the desktop software stack would be a huge regression for nearly everything we care about and focus on improving. It's already possible to run desktop Linux apps in GrapheneOS including GUI apps via the hardware virtualization support and there's a desktop mode.
@GrapheneOS @lumi

me with a musl, openrc, and sway system looking over -- i think you're starting with the wrong premise here
@navi @GrapheneOS @lumi hate seeing people fight over this as if sandboxing is something that can never be made freedom-respecting. i consider it a distinct lack of imagination not to re-evaluate and seek to virtualize OS interactions which impose relatively generic models of trust and access that are heavily overloaded in the standard linux userspace and cannot be simply reused
@hipsterelectron @GrapheneOS @lumi

> i consider it a distinct lack of imagination not to re-evaluate and seek to virtualize OS interactions which impose relatively generic models of trust and access that are heavily overloaded in the standard linux userspace and cannot be simply reused

well grapheneOS is trying something like that https://grapheneos.org/faq#roadmap -- aosp only, but it feels like the same vibe to me?
GrapheneOS Frequently Asked Questions

Answers to frequently asked questions about GrapheneOS.

GrapheneOS
@navi @GrapheneOS @lumi linux is in fact a corporate project and has been for a while and it's ridiculous and unserious to me to portray it as the apex of "freedom-respecting" because of the many vested corporate interests who are inextricable from the linux governance structure. linus demonstrated that you can get corps to invest in your open source code like this but the coercion and inertia works both ways
@navi @GrapheneOS @lumi i'm working on bootstrapping build and packaging logic atm and sandboxing mechanisms like unshare paired with virtualization like overlayfs is a tool that enables surgical precision in constructing dependency graphs that don't make overly broad assumptions about the user environment, enabled by crafting OS interfaces to model the trust and access specific to my application context.
@navi @GrapheneOS @lumi it is just remarkably obtuse to claim (as the fdroid entourage is so fond of doing) that the interaction model advanced by mainline linux distros is inherently freedom-respecting when it is being specifically invoked to rule out R&D into e.g. privacy-respecting models of trust and access that are simply not interesting to mainline linux
@navi @GrapheneOS @lumi "freedom-respecting" is not a measure of how closely it hews to the vision of linus torvalds but a measure of how much a software ecosystem precludes alternative imaginings of the user's relationship to their computing hardware. no one in this discussion would argue that android is not a corporate project, but the implicit and ridiculous assertion that goes unchallenged is that when linus torvalds got corps to work for him that he was necessarily still working for you the user. systemd too seeks to apply corporate computing models to distros with actual users and was notably to blame for enabling the xz-utils vuln. we can do so much better! this should be an exciting new frontier where we can push each other to shake off the chains that bind us to hierarchical power relations! linux is the floor!