Hi,
I am (very, very early) in the process of degoogling. I am definitely not a high risk as far as needing to be completely locked down. It’s more about trying to have a little more control over how my data is used.
I am looking at Graphene OS, but I am a little confused how certain apps (that rely on Google services) work. I have a Pixel 8 and will have it for the foreseeable future.
The apps I currently use that I would still need (or their equivalents) are:
- Clash Royale (Supercell)
- Notion (Notion Labs)
- Clickup (Mango Technologies)
- Business Calendar 2 (Appgenix)
-
If I installed these exact apps “sandboxed”, what exactly does that mean from a user standpoint? Will I have to use a separate account, reboot my phone, etc, or is it a quick process to use the app?
-
Is there a list of apps that I could browse to find equivalents to the above? Recommendations here are also ok.
-
I saw that Firefox isn’t exactly private(?) and that Vanadium is better in that aspect but I don’t understand why. Can someone ELI5, and help me see if this is a relevant concern for me?
Thank you! 😁
Cellebrite is an Israeli company, similar to the one selling Pegasus malware, that gives these special phone unlocking kits, and sells them exclusively to governments and “authorities” for a price of roughly $1 million per kit.
What I saw (and screenshotted) was on Luke Smith’s video about AOSP forks, a GrapheneOS propaganda account claimed they got one kit and tested the fork against Evil Maid attacks and the kit failed. Where did they get all this money? This happened few months after I kept arguing everywhere that “security” claims for Graphene and Pixel phones were largely bogus and it is not much different than any AOSP fork, something I still say evidently. Pixels, just like iPhones or Samsungs, get exploited by Cellebrite kits all the time. Pixel security is not otherworldly. The whole hullabaloo by Micay and GOS people seems to be about unlocked bootloader risk with other phones except Pixels, yet there is no guarantee or testing proof that after flashing GOS, it will be immune to bootloader attacks.
And yes, I sometimes am angry, not because I am a moderator, but because I have done years of work to expose this “security” bullshit that keeps plaguing FOSS and privacy communities. Many people including Torvalds himself have called them out in the past. I do my little part to protect FOSS and privacy spaces.
I found the article (ironically in Graphene’s own forum) where they word their explanation in a way that would have us believe their project can counter Cellebrite with little to no effort. And I find that to be deceiving. I don’t know if they can, but from the universal knowledge that the 100% secure system does not exist, I find their claim hard to swallow.
I have to say, this is good food for thought. And this is where we could try to start a productive debate.
Within my limited technical knowledge, I have yet to see any mobile OS (ROM or otherwise) that comes close to the level that Graphene allows the user to secure their phones. I am not saying that Graphene is some sort of “fire and forget holy grail” of security, but checking the tracking in the included apps (all 5 of them), and finding absolutely nothing tracking, I have to say, it’s a very nice move from what the common folk uses (or used in my case) in their devices. On top of that, I have full control over 99% of my system (what with storage and contact scopes, plus the ability to disable ALL the apps I want, whenever I want, the control over all of the connections to my preference, and the list goes on and on. I have also tried Calyx (I have nothing bad to say about it, it’s pretty good and intuitive), which I think is an easier entry level than Graphene to incur into the privacy seeking life (my very personal opinion), but Graphene does take all that to different heights.
You might be wondering why all this long bloglike post. I thought it best to clarify my position towards Graphene as much as possible before i came out with what I’m hoping will spark the productive debate I mentioned before.
Other than GrapheneOS, what other real, potentially competing, options are out there?
Because, even with whatever flaws that GrapheneOS may have, it certainly beats having an iPhone, more so any other Android OS/ROM for that matter.
All previous joking aside, you’re evidently better versed on this subject than most of us, from my perspective anyway.
What would you recommend, short of getting a dumb phone with a prepaid sim card?
I’m genuinely curious about what you understand would be a better option.
“Linux phones” are not a viable option in over 90% of use cases (God O wish that wasn’t the case).
I’m waiting for the Pixel Fold 2 to launch, to see if I’m going to change my Pixel 7 Pro for that, or if I’m going to wait for the 9 Pro. But since this came up here, I might as well pick other brains and then do some research using the suggestions I find here as a starting point.
What is this list, that has no equivalent in Android/AOSP in general? Storage scope existed since Android 10, when GSF was introduced separately from native storage access. I have no clue when they claimed to “invent” contact scope, but a different user account (like work profile) segregates everything from storage to network tunnel to contact storage, and user accounts have existed for 10ish years. Disabling all userspace apps is possible on all Android phones as well, just not system apps, for which you need a computer and ADB/Shizuku API access, all of which can be done without rooting or a special “custom ROM”.
CalyxOS. Even LineageOS is fine. Even not putting one of these things on your phone, and doing things non-rooted (my guide) via ADB/Shizuku on any Android phone in the past 5 years is going to be fine. An exceedingly more important (99% as you say) thing is the user, them forming a proper OPSEC, and not making OPSEC mistakes.
These AOSP forks are tools, and all of these open source tools are uncompromised, that is a common theme. Tools do not really matter at this point if you use any of them. It is like picking any Linux distro. You are pretty much safe from telemetry and spyware immediately compared to a vanilla Windows installation, the moment you pick a distro.
That is impractical if you want to enjoy the benefits of urban society, and function more smoothly in it. You should treat your communicator (smartphone) as a normal device that cannot be made bulletproof, and relegate the utmost private activity to a Linux (or debloated Windows) computer instead, either of which is easier to control than a phone. If you need to have work apps, have them. If you need to have a rental cab app, do not risk your life for that extra bit of privacy, keep it maybe in work profile. If there is a game, it may be fine to enjoy it, unless it requires privacy invasion (no throwaway account possibility).
Understand that your communicator is a pocket computer that is handy in a pinch on the go, not your main computing device. Segregate activity between your phone and computer as needed. If that is too hard with work/job, introduce a second dedicated work phone, for a total of 3 devices.
Also understand your mental health and physical safety is more important than 1% more digital security. If either of those 2 are compromised, your digital privacy or security means nothing. This is the key reason why most “privacy” people get fatigued and say “fuck it” and leave the idea of attaining privacy altogether. Everyone does not need to be a Snowden.
That’s a pretty pretty good set of suggestions and explanations, and i appreciate you taking the time to express them.
While the storage scopes ability has been there since Android 10, I have never seen the level of granularity by app that GrapheneOS provides anywhere else, which justifies the mention of it on GrapheneOS. I never said that they invented Contacts scope, and I am not aware if this is their doing or someone else’s. The ability to choose scoped content by app is super convenient, and IMO more straightforward than using different accounts for this purpose. Now, having segregated profiles for the apps that I know I need and have no way of replacing with a “tracker-less” alternative (such as my Aruba InstantOn app) is a God-sent, no doubt. Using ADB is not for the faint of heart, we all know the capacity of damage it has if used carelessly, and punching a hole with Shizuku does expand the vulnerable attack surface, specially since it enables those holes over WiFi.
If you could share your guide, I’d appreciate it. I am paranoid about using Shizuku or any other type of hole punching method.
I’m 100% in agreement with you in this comment. Any Linux distro will remove almost all risk of telemetry or spyware when we choose to move away from Windows or Mac, unless you opt-in to some telemetry on a few, like Ubuntu for example, and even then, the difference is night and day.
I think your logic for this comment is inherently flawed based on your personal use case and experience. In my very personal case, it is practical, because, while I do want to enjoy some of the benefits of what you call urban society, I am not willing to trade privacy for convenience, much less security. No device is bulletproof, we agree on that, but wee can make it harder for others to invade our privacy, and I believe that, the more of us put in the effort to doing just that, the more likely these privacy nightmare companies are to rethink their business practices, whereas if everyone is just following the path of least resistance, which is the case with the vast majority of the users out there, they have no incentive to even try to change their ways. Practicality will always boil down to how far any 1 individual is willing to go to achieve something without dramatically breaking their way of life. That’s why it’s important to voice all these concerns and provide potential solutions to replace mainstream software (OSs, ROMs, apps, etc.) with alternatives with which we may have more control on what we share. There’s no one-size-fits-all solution, proprietary or open source, it just does not exist, simply because we’re all different to at least one minimum degree, which is what makes this subject as open for debate as it is. I do just that, with GrapheneOS, keep my “trusted” apps in my main profile, and all the crap I don’t trust in a separate profile. But just keeping profiles separate is what I think counts ass following the path of least resistance, when there are so many other options to add to just that 1 action. It is exactly as you say, if I didn’t have my car, I would probably have Lift or Uber on my phone, because I’m a privacy and security freak, but I’m not stupid enough to put myself in danger over that alone. What’s more, I do keep an Uber account that I have, however, I don’t have it in my phone. If I ever need it, I’ll download it, use it, and remove it thee moment I don’t need it anymore. In my personal case, I do most of everything in my PC or laptop, both running Linux (the distro is irrelevant, as we seem to agree on that. But that does not mean that I will be away from my computers, and if I need to do something urgently I have to blast out like a rocket to do it instead of just doing it right there on my phone because I can do it without worrying about spyware or surveillance, or even a potential hack of any kind, because I trust my phone more than if it was using the software the manufacturer wants me to use for their sake, not mine.
This is unrealistic for most people. I’m inn a privileged position where I can get as many devices as I want without missing a house payment or going hungry, but that’s not the case for everyone. But not having the means to have more devices, for example, does not have to forcibly render you unable to do something about achieving a higher level of privacy and a higher level of security, together with more control over your device and data. This is why these projects exist, they give us options.
This is yet another matter of perspective comment. We agree 100% on the health subject. Nothing should come first. Chasing more privacy and security can be pretty exhausting, I should know. But once I started seeing it ass a hobby that brings with it benefits, as opposed to “something I need to do so I don’t loose as much sleep over who’s racking me”, it’s turned into a game for me, in which I will either win, or loose, and even that will vary as time moves forward. Since I started moving towards a less invasive lifestyle regarding technology, that’s all it is for me, a game. True, it’s a souls-like game, where the enemies will probably kill you a few times before you level up and finally pass them to move on to harder enemies, but a game nonetheless.
I want to make this abundantly clear. While I am passionate about privacy and security, the pursue of this is not something that drives my daily life, but something else in which I can achieve more knowledge and potentially help others with along the way. This also provides me with the possibility of having meaningful (and sometimes just silly) conversations form people of all walks of life, cultures, philosophies, etc.
Please, if you would, remember to send me your guide, the one you mentioned on your second paragraph. I’d genuinely like to see what your process looks like and compare it to what I currently have.
This is the type of conversations I like to have, somewhat different points of view with logical ways to back them up.
What is this granularity? I would like to see.
Using ADB and Shizuku is far easier than flashing GrapheneOS or anything else on a phone, as it carries no risk of bricking. And Shizuku/ADB fundamentally work over USB cable first, WiFi second. I prefer the old USB cable method because the moment USB cable is unplugged, you can no longer use those APIs without manual USB plugging in and manual user authorisation.
https://lemmy.ml/post/128667
If using Shizuku is equivalent to punching a hole, flashing GrapheneOS is like shooting a shotgun point blank on the head.
Also, I use AppOps with the FOSS Shizuku API, instead of AppOpsX.
Everybody has a phone and a computer. Everybody cannot flash a custom ROM or do this mumbo jumbo. And everybody does not like risking bricking their phones. What everybody can do though is use non root methods to harden privacy and security, that work across all Android phones, instead of being exclusive to some phone brand/model like Pixel not even available in most countries in the world. Also, some people do try compartmentalising at very basic levels, just not with a threat model and discipline, which is what privacy communities should provide.
GrapheneOS weirdos even tell people on their Matrix chat to go fly to other countries and get a Pixel, otherwise they will not get privacy and security. Weird people. https://i.imgur.com/Yv9nvxy.jpg
I am not going to tell you how to visualise the problem, but even this will become fatiguing. If you are not training yourself towards following a threat model effortlessly and with least device dependence, it will become hard and sometimes impossible.
I believe in digital minimalism being a key factor in living a private life smoothly, and partly also why I named my community privatelife, because that is what I teach people. The lesser you obsess with this circus and the more naturally you formulate a private life protocol, the more mental peace and time you have in life for other things. You also mitigate or avoid participating in dystopian capitalist attention economy. https://www.youtube.com/watch?v=NJZ5YNrXMpE
Dude, your guide is amazing. Many apps you suggest intersect with my preferred apps (for example Joplin. Best Notes app I’ve ever used, on any device).
I’m going to he playing with Invizible Pro once I go back to Calyx (I plan on doing it this weekend because this werk has proven to be insane at work, and I dont want to do ANYTHING after I turn off my PC).
The double-VPN option, insanity, I jad no idea that was even possible.
Granted, the guide is 2 years old, but most of those still work today, even on Android 14.
And big Kudos on all the links providedbto shed light on Apple’s bullshit “it’s for your security” politically correct discourse. This shows how little people are willing to reseach before choosing a device.
In any case, I for one still think that degoogling a Pixel device is the best option for my use, since I’m very happy just stripping them out of their original software (system and apps), and runninf over to Calyx or Graphene. I can’t say why, I just like to do it. Plus, in my experience, pretty buttery smooth for what I do.
Just condensing both comment replies here.
The problem is when you need some technical support for it. Micay considers anyone not worshipping the fork his enemy, no matter if neutral or critic. If you even dare to raise plenty questions, you will be met with a dead end or a ban. Lots of people have complained to me across the years.
I would suggest you also give Silent Notes a shot. Encrypted, and a bit more discreet than Joplin or Standard Notes or other notes apps. Lightweight as a butterfly.
I have not yet updated the guide because it barely needs any updating, and the core stuff is still the same. App recommendations could be updated a little, and some minor things. I make my guides future proof for years, so it stays relevant if it gets shared around, which does happen.
I figured that. Over 95% “privacy” people I have observed do debloating/despywareing as a pastime/fun hobby, and out of cultural coolness regarding the “fuck corporations” anti-capitalist sentiment. You will achieve performance benefits the moment you debloat stuff, and…
my secret sauce
in developer options, set process limit per app to 2 or 3.
Thanks a lot man. That’s a fair point. Not many people have the know-how and the drive to dig 30 pages down search engines looking for that 1 person with their exact same issue and how to solve it, having to go down the road of asking in the official communities. And if they’re going to be faced with vexation over even considering a different option, that’s toxicity at it’s highest level. That’s Nazi behavior right there.
In any case, remember i said I was going to go back to Calyx, because “why not”? Well, I saw myself with some spare time yesterday, and here we are 🤣.
And you’re right, my main drive is just that: “FUCK Google, Crapple, Microshot, EA, Meta, the governments (all of them), and everyone else that wants my information without my consent”. It’s not my only drive, but certainly the top one, followed closely by “if I can do it, why not?”.
I’ll change those settings too, and will be test-driving some of the apps and tricks in your guide that don’t intersect with mine, as well as the ones that are completely news to me.
Thanks again man.
Edit: Just changed the settings:
Most of what you mention here I had no idea existed, and I appreciate you sharing it.
As for the scope granularity, this is a simple example for both, Telegram (Nekogram in my case):
Access to 1 contact (added as an example, because in reality i don’t give it access to any of my contacts).
And access to 1 PNG image.
Also, thanks for sharing your guide. I’ll go over it as soon as I’m off work.
On how the GrapheneOS team chooses to use fearmongering to make people believe there are no other options, I don’t follow people or waste my time going into those threads and conversations. Doing thqt would be like asking people over at Google why I should avoid Google. That’s yet another reason why I like to have these types of discussions with open communities, the chances of a fully biased point of view decreases dramatically (although it’s never fully eliminated).
Here is an alternative Piped link(s):
https://www.piped.video/watch?v=NJZ5YNrXMpE
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I’m open-source; check me out at GitHub.
The point of break in 99% of the cases is the carelessness of the user.
Yes, that is true. Every arrest related to cyber matters has resulted from either bad OPSEC or being caught red handed physically.
That is exactly right.