Posted by Georgelemental 2 days ago
"GrapheneOS responded by disabling the underlying optimization entirely in release 2026050400."
GrapheneOS "fixed" the leak by disabling the optimisation
Some HN commenters in the past have praised QUIC and downvoted comments that questioned who QUIC stands to benefit the most
Using QUIC may serve the interests of others but for me the tradeoffs are not worth it; I block QUIC traffic
QUIC is sometimes on by default in software distributed by Google, like Android, and in some cases there is no option to disable it
GrapheneOS also has fixes for around 5 other VPN leaks and more fixes on the way. Android currently implements VPNs in a way that's prone to leaks due to VPNs being per-profile but profiles not using their own network namespaces yet and also depending on central services for the DNS resolver and various other things which have to properly handle VPN support. We have plans to improve the VPN architecture in the future to make it very resistant to leaks. There will also be support for running apps or groups of apps in VMs which can have even stronger protection against it.
QUIC as it is is brilliant, and this is not a feature of the protocol, it's a feature of the surveillance OS (Google's Android).
Other than that I checked on the OS before the latest release, and it didn't work anyway.
Beside, what would be a great distribution beyond grapheneos. iOS isn't, stock Android is much worst, calyxos ? Lineageos ? They are much worst on the security.
Motorola Mobility LLC, a US-headquartered, entirely Chinese owned subsidiary of the Chinese computer manufacturer Lenovo, is an NSA contractor?
That’s news.
> A distro with shady revenue sources (check for yourself)
Do me a favor and tell me about our apparent shady revenue sources. We are run entirely by donations, there are large donors too.
> with shady hardware restrictions that only permits to use spyware phones from google
We cover this topic literally everywhere on a daily basis, with a thorough list of requirements found on our website.
> after years of complaints now permits you to use hardware from an NSA long time contractor.
Motorola Solutions and Motorola Mobility are entirely different companies. We've partnered with the latter.
> No, claiming that some magic hardware makes you more secure is not a valid reason
To bring you a rather extreme but also straightforward example, leaked documents from forensic software show we're holding up incredibly well.
> when you are using hardware where they have every reason to track you even further. Saying "nothing was found so far" is no excuse
Okay, so nothing we say will encourage you to change your thinking then.
> Now claims to solve a VPN leak when not long ago this same group were exposed promoting a governamental VPN and honeypot, a.k.a. Tor.
What?
> Just don't expose yourself to bait distros that forces you into spyware.
Strong claims like yours should ideally be backed up with equally strong sources and evidence, otherwise you quickly run out of steam.
> (not even complaining about their shady software choices).
Which are?
I'd happily talk in detail about donors when you first make public the values and donor list for the bigger ones, which you don't for some shady reason and only reveal a few. Even from those few, your biggest public donor are the people well known to dodge real privacy in crypto faster than vampires dodging holy water. Please disclose how much money you pay to the blog/media to shill this project so frequently.
You won't do any of this. You know that, I know that, you know that I know that and still you will continue to profit on those who will never read these comments.
Why is tor a honeypot?
It was shown a few years back that if you control enough of the exit nodes (more than some specific % that I don't remember off the top of my head) then you can associate traffic across most/all of the Tor network. Since running exit nodes is relatively cheap the assumption was that the feds (or some other state actor) were already doing so.
I'd call that materially different than a honeypot though since it wasn't designed for that purpose.