We have early access to Android Security Bulletin patches and will be able to set up a workflow where we can have releases already built and tested prior to the embargo ending. For now, we've still been doing the builds after the embargo ends. It will mainly help when they screw up pushing to AOSP.
reshared this
GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •We did not have early access to Android 16 QPR1 and have not been able to start porting yet. We should have early access prior to Android 16 QPR2.
We're going to need to make private repositories for working on this stuff internally. We can potentially make special preview releases based on these.
GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •Joe Vinegar reshared this.
GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •TapTrap: Animation‑Driven Tapjacking on Android
taptrap.clickChristophe B. reshared this.
GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •GrapheneOS
in reply to GrapheneOS • • •Felix
in reply to GrapheneOS • • •fractal_timescales
in reply to GrapheneOS • • •So just to check my understanding here, you'd make a special release, binaries only for the patches. Someone outside the project decompiles the binary, uses it to discover the vulnerability, which they then report to you. Then you fix it for regular Graphene users.
If I'm understanding correctly, then is there a chance the regular Graphene users don't get the patches if nobody outside the project does the decompiling? I would love to contribute, and maybe this is a reason to get good at doing this kind of thing. But I don't think my technical skills are up to scratch yet.
GrapheneOS
in reply to fractal_timescales • • •fractal_timescales
in reply to GrapheneOS • • •astroboy
in reply to GrapheneOS • • •GrapheneOS
in reply to astroboy • • •Buccia
in reply to GrapheneOS • • •GrapheneOS
in reply to Buccia • • •GrapheneOS
in reply to GrapheneOS • • •@BucciaBuccia Nearly all OEMs were failing to ship the monthly security patch backports despite how straightforward it is. The backports alone are not even particularly complete patches. They're only the High and Critical severity Android patches and a small subset of external patches for the Linux kernel, etc. Getting the full Android patches requires the latest stable releases.
They changed the system to make OEMs look better. It's due to pressure from some OEMs and Google marketing Android.
wod0bow
in reply to GrapheneOS • • •GrapheneOS
in reply to wod0bow • • •wod0bow
in reply to GrapheneOS • • •Demi Marie Obenour
in reply to GrapheneOS • • •Iznogoud
in reply to GrapheneOS • • •Rafael
in reply to GrapheneOS • • •Celinho
in reply to Rafael • • •GrapheneOS
in reply to Celinho • • •Multi
in reply to GrapheneOS • • •GrapheneOS
in reply to Multi • • •iguana09863
in reply to GrapheneOS • • •GrapheneOS
in reply to iguana09863 • • •Multi
in reply to GrapheneOS • • •GrapheneOS
in reply to Multi • • •@multisn8 We have security partner access now and they made it worse for us too because GrapheneOS is open source...
They also massively lowered the bar for other OEMs and for themselves. We want to ship the patches ASAP but no one else is doing it in practice.
leighelse{}
in reply to GrapheneOS • • •Google is now starting work on a task of consummate importance to them; making independent builds of Android unworkable.
See grapheneos.social/@GrapheneOS/…
GrapheneOS
2025-09-07 17:26:28
GrapheneOS
in reply to leighelse{} • • •leighelse{}
in reply to GrapheneOS • • •Just Bob ♒🇺🇲🪖🐧
in reply to GrapheneOS • • •Sexualizer
in reply to GrapheneOS • • •GrapheneOS
in reply to Sexualizer • • •