this post was submitted on 21 Aug 2025
16 points (100.0% liked)

GrapheneOS [Unofficial]

3534 readers
1 users here now

Official announcements from the GrapheneOS project.

Subscribe to this community or add it to your RSS reader in order to be notified about new releases and important updates.

Search c/GrapheneOS.

For discussions about the GrapheneOS project, visit our forum or join our community chat.

Our Code of Conduct.

GrapheneOS is a privacy and security focused mobile OS with Android app compatibility. This is a community based around the GrapheneOS projects including the hardened Android Open Source Project fork, Auditor, AttestationServer, the hardened malloc implementation and other projects.

Please use our official install guides for installation and check our features pageusage guide and FAQ for information before asking questions in our discussion forum or chat rooms to get as much information as possible from what we've already carefully written/reviewed for our site.

Contact the moderators of this community if you have any questions or concerns.

founded 4 years ago
MODERATORS
 

Swissquote has launched official support for GrapheneOS for their main app instead of it only being available for Yuh:

https://play.google.com/store/apps/details?id=com.swissquote.android

What’s new

  • We now officially support GrapheneOS!
  • Bug fixes and minor improvements

They're verifying GrapheneOS via hardware attestation.

The code added for verifying GrapheneOS would be easy to extend on the server side with support for other alternate operating systems. They could also support future non-Google roots of trust to permit hardware not certified by Google. It still restricts what can be used but is at least extensible.

More apps using the Play Integrity API should implement this. It can initially be integrated to allow either the Play Integrity API or hardware attestation. Hardware attestation can be used to fully replace the Play Integrity API at the expense of legacy device support but that's not mandatory.

See https://grapheneos.org/articles/attestation-compatibility-guide for more information. Apps implementing this need to add new verified boot key fingerprints when GrapheneOS adds support for more devices since per-device keys are important for security. For our own devices, we could simply have our own attestation root of trust.

you are viewing a single comment's thread
view the rest of the comments