329 Followers
122 Following
317 Posts

While #NixOS should not be affected by #CopyFail as it uses recent kernels, here are additional fixes you can apply:

Disabling setuid does not mitigate it, but reduces the attack surfaces overall significantly.

Instead of #sudo, #su, #pkexec and other #setuid binaries you can use #run0 or a dedicated root account.

I have disabled setuid for a bunch of binaries I don't need, they still work when ran as root, with run0 or #sudo-rs.

```nix
boot.blacklistedKernelModules = [
"algif_aead"
];

security.sudo.enable = false;

security.wrappers = {
su.enable = false;
pkexec.enable = false;

# example setuid binary
chsh = {
source = "${pkgs.shadow}/bin/chsh";
setuid = lib.mkForce false;
owner = "root";
group = "root";
};
};
```

To verify the integrity/authenticity of your IronFox installation, in addition to the checksums provided below, we highly recommend using AppVerifier (https://github.com/soupslurpr/AppVerifier):

Package ID: org.ironfoxoss.ironfox

SHA256 hash of signing certificate:

C5:E2:91:B5:A5:71:F9:C8:CD:9A:97:99:C2:C9:4E:02:EC:97:03:94:88:93:F2:CA:75:6D:67:B9:42:04:F9:04

## Checksums

ironfox-150.0.1-arm64-v8a.apk:

77013ca24239b2a54e6f45dfe81fd7af4d108ed0a510b122f23a0e1bd49d788cf3281c19a2cdfc94994391e162977c8ebcc9671a651face386844e02bcfd8333

ironfox-150.0.1-armeabi-v7a.apk:

49b0a0c47bd9585e37ab0b637ba4c489980c798d0f985205e1ca33d0fc1f0dde00bc468971c9987d0440e891a0c7e39dc9e8996e1c2d0d07fa6ee8fac87eb4c1

ironfox-150.0.1-x86_64.apk:

b5467f7191dea87db3feeccf5ac7106f94f7911ada5e5cb5a7257dd0a1509090cba398aa78246360ba5ca16c3fa34e97131cc42878c52b7e5c030eaa9661b105

ironfox-150.0.1-universal.apk:

8dfb669a6e873dcbc373c99e434ec48ce66246d763e73d8dfe92e5a3b7a6d05915742b98016e18945494b26772a37662e27223b77e998ee6fc80c646ca9592eb

ironfox-150.0.1.apks:

4fca0b256adcfbcc611dc811759e299ff35d474c66ea2b7ef57cc65091e3921ed24e7a6f4711c48b318ce7b6e3732a15f756f394f222d734c001410c1be716e0

GitHub - soupslurpr/AppVerifier: Verify apps easily.

Verify apps easily. Contribute to soupslurpr/AppVerifier development by creating an account on GitHub.

GitHub
IronFox v150.0.1 路 IronFox OSS / IronFox 路 GitLab

IronFox 150.0.1 Changes ...

GitLab
2026.04.27.1 - celenity/Dove

# Dove 2026.04.27.1 ____ **<details><summary>鈿狅笍 NOTE FOR MACOS USERS**:</summary> This release adds a couple new environment variables to disable Mozilla telemetry. While not *strictly* required, it is *highly* recommended to update Dove's environment variables. The recommended way to do t...

Codeberg.org
2026.04.27.1 - celenity/Phoenix

# Phoenix 2026.04.27.1 ____ **<details><summary>鈿狅笍 NOTE FOR MACOS USERS**:</summary> This release adds a couple new environment variables to disable Mozilla telemetry. While not *strictly* required, it is *highly* recommended to update Phoenix's environment variables. The recommended way t...

Codeberg.org

FYI for #IronFox Obtainium users:

Due to changes in how we upload/handle releases (Notably, we now upload them to releases.ironfoxoss.org), the current Obtainium configuration no longer works as expected.

To resolve the issues and ensure you keep receiving updates, please remove your current configuration, and add your preferred new/fixed configuration from here:

https://ironfoxoss.org/download/#obtainium

We apologize for any inconvenience this may cause, and thank you for your time/support!

IronFox

The private, secure, user first web browser for Android

IronFox

To verify the integrity/authenticity of your IronFox installation, in addition to the checksums provided below, we highly recommend using AppVerifier (https://github.com/soupslurpr/AppVerifier):

Package ID: org.ironfoxoss.ironfox

SHA256 hash of signing certificate:

C5:E2:91:B5:A5:71:F9:C8:CD:9A:97:99:C2:C9:4E:02:EC:97:03:94:88:93:F2:CA:75:6D:67:B9:42:04:F9:04

## Checksums

ironfox-150.0-arm64-v8a.apk:

56b95b9fea51acb07f896f1f20151e797981236e59f0210bfad99d41298a3adc84ce0895ad74dcc3079c8205a4cd230e3e7739c144846145f0b117db900bd9e1

ironfox-150.0-armeabi-v7a.apk:

d068fe67c932584bdbc8c48562f976a24fa4038360947d40e22ede51dfef6b8b1fdbdfc88d7208ac8a38fc87a6586694bfde09bb6b535a074643a1f2ddd9088b

ironfox-150.0-x86_64.apk:

2be109d5b613ef38465d6316c6b697c8398e7a01f3031cac45361d617d0cecf350842a98f35c9e433c5324ee49953df5c879f8af029c2a0061b543c0cf798428

ironfox-150.0-universal.apk:

2a63e24e288beff65ae16ae1b71969d4e71cff61587ef030a5cb21478979673f83cce1c179ad5a8d055a8e4e683ea6ec010adcd1580c0cb048bbb8240231462f

ironfox-150.0.apks:

ad2bef8622ea67d14590ee455a870573af95ff554898ef07573bd156d9811d3599cefb6f08f53179543028b44d503b6d8550a642d0e66c02124c43a94df043b8

GitHub - soupslurpr/AppVerifier: Verify apps easily.

Verify apps easily. Contribute to soupslurpr/AppVerifier development by creating an account on GitHub.

GitHub
IronFox v150.0 路 IronFox OSS / IronFox 路 GitLab

IronFox 150.0 IMPORTANT: We've officially migrated our issue tracker

GitLab
WIRED has gone ahead with publishing an extraordinarily inaccurate article about GrapheneOS. It presents a highly inaccurate history of the GrapheneOS project heavily based on fabrications from James Donaldson. WIRED failed to incorporate most of our responses to his inaccurate claims.

Hi everyone, we, #IronFox, are excited to announce that we鈥檝e officially migrated our issue tracker to @Codeberg : https://codeberg.org/ironfox-oss/bugs/issues. **Issues will no longer be accepted on GitLab and in any repo outside of this one**.

This will allow us to be far better organized and more efficient/productive - as instead of having several different issue trackers (one for each of our repos) across two different sites (GitLab and Codeberg), we鈥檒l now have a single, unified, and accessible place for all issues. It鈥檒l also make it a lot easier for users to navigate and search through existing/already filed issues.

We look forward to hearing what the community thinks of this change!

bugs

IronFox issue tracker

Codeberg.org