final [GrapheneOS] 📱👁️🗨️ on Nostr: In January 2024, we reported several vulnerabilities being exploited by the XRY tool ...
In January 2024, we reported several vulnerabilities being exploited by the XRY tool from MSAB to get data from Android devices including stock OS Pixels. In April 2024, Pixels shipped a reset attack mitigation we proposed preventing the whole attack vector. We plan to expand it.
Currently, non-Pixel devices are still vulnerable to these reset attacks. In June 2024, Android 14 QPR3 included another feature we proposed providing wipe-without-reboot support for the device admin wipe API. We shipped this early and use it in our duress PIN/password feature.
We also began triggering a full compacting garbage collection cycle in system_server and SystemUI when the device is locked based on info about these attacks. This releases memory for no longer allocated objects to the OS, where our generic zero-on-free feature clears all of it.
In the near future, we plan to ship support for adding a PIN as a 2nd factor to fingerprint unlock to enable users to use a strong passphrase combined with PIN+fingerprint secondary unlock for convenience. We have an initial implementation, but it needs more work before shipping.
Published at
2024-07-21 20:14:50Event JSON
{
"id": "60205e70f7b6e30329d01d859f31a27fab5ad871788514108936a022bc5ad9b2",
"pubkey": "c15a5a65986e7ab4134dee3ab85254da5c5d4b04e78b4f16c82837192d355185",
"created_at": 1721592890,
"kind": 1,
"tags": [
[
"e",
"f991d98ce6dd92871279914d60083921ebfc1533ac190ad112c2173af1f3d55b",
"",
"root"
],
[
"e",
"88e38d1decf96a230bb2560340f4c820df02d4ee2d77539e3fb59651036752c5",
"",
"reply"
],
[
"p",
"c15a5a65986e7ab4134dee3ab85254da5c5d4b04e78b4f16c82837192d355185"
]
],
"content": "In January 2024, we reported several vulnerabilities being exploited by the XRY tool from MSAB to get data from Android devices including stock OS Pixels. In April 2024, Pixels shipped a reset attack mitigation we proposed preventing the whole attack vector. We plan to expand it.\n\nCurrently, non-Pixel devices are still vulnerable to these reset attacks. In June 2024, Android 14 QPR3 included another feature we proposed providing wipe-without-reboot support for the device admin wipe API. We shipped this early and use it in our duress PIN/password feature.\n\nWe also began triggering a full compacting garbage collection cycle in system_server and SystemUI when the device is locked based on info about these attacks. This releases memory for no longer allocated objects to the OS, where our generic zero-on-free feature clears all of it.\n\nIn the near future, we plan to ship support for adding a PIN as a 2nd factor to fingerprint unlock to enable users to use a strong passphrase combined with PIN+fingerprint secondary unlock for convenience. We have an initial implementation, but it needs more work before shipping.",
"sig": "57641cf5f97f7cfc80dd4e819c8454534d641755e4f52e5e8b20c0d9912639a49daa44c98ee21b3ed1c258dabe3ac983a3f41b704ad5291987817a39efce727a"
}