I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?
I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?
I’m surprised you’re looking down on Samsung… Samsung Knox is military-grade, right up with IOS:
https://community.spiceworks.com/t/a-military-grade-phone-how-dod-standards-helped-hone-the-samsung-knox-platform/514009
I would call that planned obsolescence… no normal user needs this.
Additionally, Samsung phones are FULL of spyware. More than google, xiaomi, huawei and others, way more. Which makes this more than ironic.
Do samsung phones allow to use LTE-only mode? Block the usb port? Prevent apps from loading code from the internet?
Are Samsung phones resistant to Cellebrite? Pixels running GrapheneOS (a free and open source OS, no spyware, no “breaking your device if you root it”)
But the fuse thing is interesting and concerning, thanks for the info.
While it seems to be unfortunately true that Samsung did ship AppCloud on budget devices, at least it’s not on the Galaxy S# series. As far as I know, Knox is incredibly difficult for hackers to crack if they steal your phone, especially if it was powered down at the time of theft. I’m unsure of why LTE-only matters (I’ve never heard of such a need before), and I don’t know about its USB port-blocking ability, but you can always get something like Rethink to block apps’ Internet access. I will need to read up on Cellebrite; I haven’t heard of that name in a while…
I have tested an S9 and it was full of preinstalled malware. No recent one but there is no reason to believe things have changed.
The USB port is disabled if water gets in. GrapheneOS used the feature to allow users to turn it off, always or while locked. That is actual security and it doesnt break the device it users want to use other (open source) operating systems on them.
LTE-only is relevant because 2G and 3G are insecure. They were part of the attack chain used by governments to install the Pegasus Spyware on phones, along with browsers allowing HTTP traffic and more things that are dealt with by GrapheneOS.
Google has implemented very few of their features to work on regular Android, riddled with proprietary spyware.
Dont forget
Hmm. So you only recommend GrapheneOS and nothing else?
I have tested all free Android variants (and debloated a few horrific proprietary ones) and GrapheneOS is by far the best, yes.
Very robust and reliable base, significant work on security unlike any other project. Not very shiny on the surface, but apps can be replaced and GrapheneOS is perfectly compatible with any Android app you wanna use.
Hell, I am administering a poor system that runs like all the big tech apps there are, daily, and it works fine!
Rethink is okay but buggy and thus leaky. GrapheneOS also has a network permission which is tremendously useful, also from a security perspective.
E.g. your keyboard shouldnt have internet access, or it might likely send all your input to their servers for “necessary analysis” lol
I have never heard of Rethink being buggy. Where was this discussed? An alternative is KarmaFW, though it’s not as sophisticated And yeah, I use HeliBoard; it’s great.
I tried Rethink recently, it is not reliable as a VPN, as it doesnt allow to block connections if the VPN connection is cut
@boredsquirrel @Flagstaff mine rethink installation was dropping my connection to the VPN constantly. It’s really not reliable. I’ve managed to block Samsung garbage in the pihole
Hmm, thanks… What VPN do you prefer? My only good one is Windscribe, I think.
@Flagstaff I self host wire guard server with pi hole. Seems to be working
Hahaha check your sources mate. Those arent real competitors and it is a long time ago.
https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation
Wrong comment? I don’t understand the connection.
No, right comment XD your sources are outdated and misleading. I gave you a relevant one to evaluate how secure a device is against physical attackers with government-level access to exploits and funding.