Top
Best
New

Posted by Georgelemental 2 days ago

GrapheneOS fixes Android VPN leak Google refused to patch(cyberinsider.com)
349 points | 128 commentspage 2
1vuio0pswjnm7 1 day ago|
"In its latest release, GrapheneOS says it has "disable[d] registerQuicConnectionClosePayload optimization to fix VPN leak," effectively neutralizing the attack vector on supported Pixel devices."

"GrapheneOS responded by disabling the underlying optimization entirely in release 2026050400."

GrapheneOS "fixed" the leak by disabling the optimisation

Some HN commenters in the past have praised QUIC and downvoted comments that questioned who QUIC stands to benefit the most

Using QUIC may serve the interests of others but for me the tradeoffs are not worth it; I block QUIC traffic

QUIC is sometimes on by default in software distributed by Google, like Android, and in some cases there is no option to disable it

strcat 1 day ago||
QUIC still works fine on GrapheneOS. GrapheneOS only removed a way to ask the OS to close a QUIC connection automatically in case the app dies, etc. It's an optimization from a server perspective since it avoids the server thinking the connections are still open and keeping resources assigned to them until the idle timeout it has configured followed by having to go through a connection shutdown process. It's not an optimization from a client perspective.

GrapheneOS also has fixes for around 5 other VPN leaks and more fixes on the way. Android currently implements VPNs in a way that's prone to leaks due to VPNs being per-profile but profiles not using their own network namespaces yet and also depending on central services for the DNS resolver and various other things which have to properly handle VPN support. We have plans to improve the VPN architecture in the future to make it very resistant to leaks. There will also be support for running apps or groups of apps in VMs which can have even stronger protection against it.

subscribed 1 day ago|||
This is the path for the graceful closing on the QUIC connection via (IMO) illegitimate/exploitative call, GOS is not disabling QUIC as a whole.

QUIC as it is is brilliant, and this is not a feature of the protocol, it's a feature of the surveillance OS (Google's Android).

Other than that I checked on the OS before the latest release, and it didn't work anyway.

mvdtnz 1 day ago||
Great, now to go and buy a Google phone so I can use it.
OutOfHere 2 days ago||
[flagged]
nunobrito 1 day ago|
[flagged]
aucisson_masque 1 day ago||
You make a lot of claim yet gives no source or material to back up your claim.

Beside, what would be a great distribution beyond grapheneos. iOS isn't, stock Android is much worst, calyxos ? Lineageos ? They are much worst on the security.

vsgherzi 1 day ago|||
Seems like volunteers and donations? Is there something else I can read to be more informed on this?
bigfatkitten 1 day ago|||
> NSA long time contractor

Motorola Mobility LLC, a US-headquartered, entirely Chinese owned subsidiary of the Chinese computer manufacturer Lenovo, is an NSA contractor?

That’s news.

spring-onion 1 day ago|||
Project member here.

> A distro with shady revenue sources (check for yourself)

Do me a favor and tell me about our apparent shady revenue sources. We are run entirely by donations, there are large donors too.

> with shady hardware restrictions that only permits to use spyware phones from google

We cover this topic literally everywhere on a daily basis, with a thorough list of requirements found on our website.

> after years of complaints now permits you to use hardware from an NSA long time contractor.

Motorola Solutions and Motorola Mobility are entirely different companies. We've partnered with the latter.

> No, claiming that some magic hardware makes you more secure is not a valid reason

To bring you a rather extreme but also straightforward example, leaked documents from forensic software show we're holding up incredibly well.

> when you are using hardware where they have every reason to track you even further. Saying "nothing was found so far" is no excuse

Okay, so nothing we say will encourage you to change your thinking then.

> Now claims to solve a VPN leak when not long ago this same group were exposed promoting a governamental VPN and honeypot, a.k.a. Tor.

What?

> Just don't expose yourself to bait distros that forces you into spyware.

Strong claims like yours should ideally be backed up with equally strong sources and evidence, otherwise you quickly run out of steam.

> (not even complaining about their shady software choices).

Which are?

nunobrito 1 day ago||
For Motorola the management changed while government customers remained the same, perhaps now adding also the Chinese gov into the mix which certainly will "approve" the hardware within. You know this quite well.

I'd happily talk in detail about donors when you first make public the values and donor list for the bigger ones, which you don't for some shady reason and only reveal a few. Even from those few, your biggest public donor are the people well known to dodge real privacy in crypto faster than vampires dodging holy water. Please disclose how much money you pay to the blog/media to shill this project so frequently.

You won't do any of this. You know that, I know that, you know that I know that and still you will continue to profit on those who will never read these comments.

YourDadVPN 1 day ago|||
Is the CalyxOS Vs GrapheneOS shitflinging about to start up again?
timschumi 1 day ago||
Not sure where CalyxOS came up in this?
YourDadVPN 1 day ago||
The developers of each have engaged in a few flamewars and the commenter I replied to was critical of GrapheneOS using similar language, so I made a (tongue in cheek comment) implying the commenter was starting the flamewar back up
MYEUHD 1 day ago|||
> a governamental VPN and honeypot, a.k.a. Tor.

Why is tor a honeypot?

Root_Denied 1 day ago||
I wouldn't call it a honeypot, but it's probably compromised by the feds.

It was shown a few years back that if you control enough of the exit nodes (more than some specific % that I don't remember off the top of my head) then you can associate traffic across most/all of the Tor network. Since running exit nodes is relatively cheap the assumption was that the feds (or some other state actor) were already doing so.

I'd call that materially different than a honeypot though since it wasn't designed for that purpose.

huflungdung 1 day ago||
[dead]