1
83
submitted 2 months ago* (last edited 2 months ago) by KindnessInfinity@lemmy.ml to c/grapheneos@lemmy.ml

Thursday, November 13, 2025 - Proton Foundation has launched their 8th edition Lifetime Fundraiser:

Since 2018, the Proton community has helped raise more than $4 million in direct grants to over 40 organizations defending privacy, free speech, and human rights.

Help us choose recipients for our 2025 Lifetime Account Charity Fundraiser!

  • Deadline to nominate organizations: November 24, 2025
  • Raffle opens: December 16, 2025
  • Raffle closes: January 5, 2026
  • Winners announced: January 6, 2026

Now it’s time to choose this year’s beneficiaries. We’re asking you to nominate the organizations you believe are making a real difference. We’ll select 10 to receive support in the 2025 Proton Lifetime Account Charity Fundraiser.

The form direct link for the Tell us who to support page is located here:
https://form.typeform.com/to/XixQrG8Q

GrapheneOS has already received two donations through past Proton Foundation fundraising campaigns.
For more details, see: https://discuss.grapheneos.org/d/28065

Donations are what fund our work on upcoming features and improvements to GrapheneOS, maintaining our current ones, and the upkeep of our infrastructure.


Forum: https://discuss.grapheneos.org/d/28065
Mastodon: https://grapheneos.social/@akc3n/115546353843172793
Bluesky: https://bsky.app/profile/akc3n.bsky.social/post/3m5kxni6at22p

2
14
submitted 2 months ago* (last edited 2 months ago) by akc3n@lemmy.ml to c/grapheneos@lemmy.ml

Thursday, November 13, 2025 - Proton Foundation has launched their 8th edition Lifetime Fundraiser:

Since 2018, the Proton community has helped raise more than $4 million in direct grants to over 40 organizations defending privacy, free speech, and human rights.

Help us choose recipients for our 2025 Lifetime Account Charity Fundraiser!

  • Deadline to nominate organizations: November 24, 2025
  • Raffle opens: December 16, 2025
  • Raffle closes: January 5, 2026
  • Winners announced: January 6, 2026

Now it’s time to choose this year’s beneficiaries. We’re asking you to nominate the organizations you believe are making a real difference. We’ll select 10 to receive support in the 2025 Proton Lifetime Account Charity Fundraiser.

The form direct link for the Tell us who to support page is located here:
https://form.typeform.com/to/XixQrG8Q

GrapheneOS has already received two donations through past Proton Foundation fundraising campaigns.
For more details, see: https://discuss.grapheneos.org/d/28065

Donations are what fund our work on upcoming features and improvements to GrapheneOS, maintaining our current ones, and the upkeep of our infrastructure.


Forum: https://discuss.grapheneos.org/d/28065
Mastodon: https://grapheneos.social/@akc3n/115546353843172793
Bluesky: https://bsky.app/profile/akc3n.bsky.social/post/3m5kxni6at22p

3
167

Many companies and individuals are trying to mislead people about the future of GrapheneOS to promote their insecure products and services. GrapheneOS is not going anywhere. We've made it clear we're shipping Android 16 soon and that the supported devices will remain supported.

Pixels remain the only devices providing a high level of security combined with proper secure support for using another OS. We hope to have more options by the end of 2026 based on contact with an OEM interested in meeting our requirements but there's no specific timeline.

Our very reasonable hardware requirements are listed at https://grapheneos.org/faq#future-devices. We expect industry standard security patches/features, not anything exotic. Multiple OEMs have indicated they should have no issue meeting these requirements with the next generation Snapdragon SoC.

In 2017, Pixel 2 added an off-the-shelf secure element (SE) with Weaver and insider attack resistance. Weaver provides aggressive throttling to make disk encryption work without a strong passphrase. Insider attack resistance means SE firmware updates require Owner user unlock.

Weaver has a key-value mapping with a slot for each profile on the device where providing the correct authentication token gets back a stored random token needed as an extra input for disk encryption. It's a few hundred lines of code. It's what makes a random 6 digit PIN work.

Most Android devices still lack a secure element providing Weaver, a StrongBox KeyMint and other standard functionality. Weaver was shipped by the Pixel 2 (2017) and StrongBox by the Pixel 3 (2018). It's not a high expectation for devices to provide these features in 2025.

Most Android devices similarly lack proper privacy/security patches for drivers/firmware from day 1 and don't provide long term support. It's not a high expectation. OEMs get 1 month early access and should always ship Android Security Bulletin (ASB) and similar patches on time.

Pixel 8 and later provide 7 years of proper updates. Our minimum requirement is 5 years which has been the case since the Pixel 6. This requirement eliminates most devices despite us keeping it at 5 years. Getting security patches on time for 5 years isn't a high expectation.

ARM provides standard exploit protections used by firmware and software to defend attack exploitation.

Pointer Authentication Codes (PAC) and Branch Target Identication (BTI) are near universal with ARMv9. Memory Tagging Extension (MTE) is more important and often omitted.

All of the standard ARM Cortex cores provide PAC, BTI and MTE. SoC vendors simply need to keep the security features intact and provide basic integration for them. OEMs need to do the same. We greatly expand usage of all 3 of these and were the first to use MTE in production.

MTE support launched with the Pixel 8 when it moved to ARMv9, but the stock OS still doesn't use it by default. In GrapheneOS, we always use it for the Linux kernel and nearly all base OS processes including apps. We provide a toggle to enable it for all user installed apps.

We use it for known compatible user installed apps by default but it's incredibly good at detecting memory corruption and uncovers a lot of bugs. Due to this, we integrated it into our user-facing crash reporting system and per-app exceptions can be made for user installed apps.

With Android 16, Pixel stock OS uses MTE for the small subset of users enabling Advanced Protection. It doesn't use it for the kernel or most of the OS, only a small portion of the OS and a tiny number of apps marked compatible. The implementation is also much weaker than ours.

Our MTE integration is one of the biggest security features we offer. Qualcomm still hasn't added MTE support, but it's supposed to be available with their 2025 SoC launch. Exynos and MediaTek added it for flagships. Samsung integrated support for it as a development feature.

Snapdragon provides solid overall security. It includes a basic secure element for the flagships. Our expectation is Snapdragon will add MTE this year and OEMs willing to do the work of providing proper security features and patches can make devices meeting our standards in 2026.

The most secure non-Pixel devices disallow using another OS or don't allow another OS to use important hardware-based security features. Samsung flagships would be the next best option if they didn't do this. Our expectation is we need to work with an OEM, so we're doing that.

GrapheneOS will continue supporting the current devices we support until their end-of-life dates. We'll also add support for new Pixels as long as they meet our requirements. We've tried to make that clear, but recent posts about changes to AOSP have been widely misrepresented.

Prior to Android 16, Pixels had first class support in the Android Open Source Project as the official reference devices. This was never one of our requirements and no other device provides it. Many people are promoting hardware and software with atrocious security based on this.

A device without proper privacy/security patches or the hardware-based security features we expect didn't become a better option due to Pixels losing something no other device has ever provided. There isn't a non-Pixel device providing Android 15 QPR2 device trees let alone 16.

4
54

GRAPHENEOS IS HIRING

Are you an experienced AOSP developer?

Interested in working full time, fully remotely on GrapheneOS?

Can you hit the ground running?

https://grapheneos.org/hiring

Global opportunity paid via Wise (local bank transfers), BTC, ETH or XMR.

5
18
submitted 4 years ago* (last edited 4 years ago) by akc3n@lemmy.ml to c/grapheneos@lemmy.ml

Hello and welcome to !grapheneos@lemmy.ml !

Our Lemmy GrapheneOS community is currently unofficial, reserved, and used for announcements/news.

GrapheneOS is a privacy and security focused mobile OS with Android app compatibility.

https://grapheneos.org/

https://attestation.app/

https://github.com/GrapheneOS

Official chat rooms: #grapheneos:grapheneos.org and #offtopic:grapheneos.org

This is a community based around the GrapheneOS projects including the hardened Android Open Source Project fork, Auditor, AttestationServer, the hardened malloc implementation and other projects.


All installs should follow the Official Install Guide. No other guides are recommended or supported.

If your question is related to device support, please see the Which devices will be supported in the future? for criteria and the Which devices are recommended? for recommend devices from the FAQ section of the official site.

If your question is related to app support, please check the Usage Guide. Sections like Bugs uncovered by security features should help if you have a native app with a security issue uncovered by hardening. If you want to know what browser to use please reference Web browsing. In general, Vanadium is almost always the recommendation for security and privacy.

If your question is related to a feature request, please check the issue trackers. OS issue tracker, Vanadium for other GrapheneOS project check the Reporting issue.


GrapheneOS has a very active community primarily based around the official chat rooms on Matrix and where most of the core community, including contributors, to the project have discussions. Most of those people are not active here on Lemmy's !grapheneos@lemmy.ml community.

The official GrapheneOS space groups together all of the official rooms along with members of the community who join the space. You can join the space at #community:grapheneos.org

Links to join our new official chat rooms via the Element web client:

Matrix Room Description
#grapheneos:grapheneos.org Best place to request support, ask questions or get involved in the project
#offtopic:grapheneos.org Discuss topics not strictly related to GrapheneOS
#dev:grapheneos.org Discuss GrapheneOS app and OS development
#testing:grapheneos.org Provide feedback on Beta channel releases
#releases:grapheneos.org Release announcements
#infra:grapheneos.org Infrastructure monitoring and discussion

You can use the client and home server of your choice. For new users, the Element web app or mobile app with matrix.org as your home server is a sensible choice.

Please contact the moderators of this community if you have any questions or concerns.

6
19

Tags:

  • 2026020400 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026012800 release:

  • raise declared Android security patch level to February 2026 which has been provided since we moved to Android 16 QPR2 in December (currently declared as 2026-02-01 even though 2026-02-05 has been provided since Android 16 QPR2 but it wasn't worth restarting the builds)
  • update to February 2026 Pixel driver/firmware code providing the 2026-02-05 Pixel security patch level
  • Dialer: fix call recording button state after fragment re-creation to avoid showing call recording as active when it isn't
  • kernel (6.1): update to latest GKI LTS branch revision
  • kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.121
  • Vanadium: update to version 145.0.7632.26.0
  • switch to 64-bit-only Vanadium releases for devices without 32-bit support (7th gen Pixels and later)
  • App Store: update to version 34
  • App Store: update to version 35
  • switch from 6.6 kernel branch to 6.12 kernel branch for emulator builds (used for development) to match AOSP since Android 16 QPR2

All of the Android 16 security patches from the current March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2026020401 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044, CVE-2026-0047, CVE-2026-0049
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-32348, CVE-2025-48600, CVE-2025-48615, CVE-2025-48617, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2025-48654, CVE-2026-0011, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025, CVE-2026-0033, CVE-2026-0034, CVE-2026-0035, CVE-2026-0036, CVE-2026-0048, CVE-2026-0050

For detailed information on security preview releases, see our post about it.

7
12

Notable changes in version 35:

  • temporarily disable predictive back until issues are addressed
  • retry automatic repository updates with exponential backoff before reporting an error
  • handle CancellationException for repository metadata updates
  • update Android Gradle plugin to 9.0.0
  • update Kotlin to 2.3.0
  • modernize code

A full list of changes from the previous release (version 34) is available through the Git commit log between the releases.

App Store is the client for the GrapheneOS app repository. It's included in GrapheneOS but can also be used on other Android 12+ operating systems. Our app repository currently provides our standalone apps, out-of-band updates to certain GrapheneOS components and a mirror of the core Google Play apps and Android Auto to make it easy for GrapheneOS users to install sandboxed Google Play with versions of the Google Play apps we've tested with our sandboxed Google Play compatibility layer.

GrapheneOS users must obtain GrapheneOS app updates through our App Store since verified boot metadata is required for out-of-band system app updates on GrapheneOS as part of extending verified boot to them.

8
19

Notable changes in version 34:

  • adjust selection logic for ABI APK variants in order to start using 64-bit-only Vanadium updates on 64-bit-only devices
  • improve edge-to-edge support for the details screen by fixing padding
  • update target API level to 36 (Android 16)
  • update AndroidX Lifecycle libraries to 2.10.0
  • update AndroidX Swipe Refresh Layout library to 1.2.0
  • update AndroidX Activity library to 1.12.3
  • update AndroidX navigation libraries/plugin to 2.9.7
  • update Glide library to 5.0.5
  • update Bouncy Castle library to 1.83
  • update Gradle to 9.3.1
  • update Android Gradle plugin to 8.13.2
  • update Kotlin Symbol Processing Gradle plugin to 2.3.5
  • update Kotlin to 2.2.21
  • update Android build tools to 36.1.0
  • raise minimum repository metadata timestamp
  • add new Let's Encrypt roots
  • raise TLS key pinning expiry date to February 2027

A full list of changes from the previous release (version 33) is available through the Git commit log between the releases.

App Store is the client for the GrapheneOS app repository. It's included in GrapheneOS but can also be used on other Android 12+ operating systems. Our app repository currently provides our standalone apps, out-of-band updates to certain GrapheneOS components and a mirror of the core Google Play apps and Android Auto to make it easy for GrapheneOS users to install sandboxed Google Play with versions of the Google Play apps we've tested with our sandboxed Google Play compatibility layer.

GrapheneOS users must obtain GrapheneOS app updates through our App Store since verified boot metadata is required for out-of-band system app updates on GrapheneOS as part of extending verified boot to them.

9
35
submitted 6 days ago* (last edited 6 days ago) by KindnessInfinity@lemmy.ml to c/grapheneos@lemmy.ml

We've built our own text-to-speech system with an initial English language model we trained ourselves with fully open source data. It will be added to our App Store soon and then included in GrapheneOS as a default enabled TTS backend once some more improvements are made to it.

We're going to build our own speech-to-text implementation to go along with this too. We're starting with an English model for both but we can add other languages which have high quality training data available. English and Mandarin have by far the most training data available.

Existing implementations of text-to-speech and speech-to-text didn't meet our functionality or usability requirements. We want at least very high quality, low latency and robust implementations of both for English included in the OS. It will help make GrapheneOS more accessible.

Our full time developer working on this already built their own Transcribro app for on-device speech-to-text available in the Accrescent app store. For GrapheneOS itself, we want actual open source implementations of these features rather than OpenAI's phony open source though.

Whisper is actually closed source. Open weights is another way of saying permissively licensed closed source. Our implementation of both text-to-speech and speech-to-text will be actual open source which means people can actually fork it and add/change/remove training data, etc.

10
18

We're now using our own autonomous system and IP space for 3 of our networks. We run 2 entirely separate anycast DNS networks for our authoritative DNS and have a simpler unicast setup on a bare metal server at Xenyth which we'll be using for more soon.

https://bgp.tools/as/40806

Our ns1 network has 11 locations on Vultr (Piscataway, Miami, Los Angeles, Seattle, São Paulo, London, Frankfurt, Singapore, Mumbai and Tokyo).

Our ns2 network has 8 locations on Misaka.io (Ashburn, Miami, San Jose, Seattle, London, Berlin, Singapore and Tokyo).

Vultr and Misaka.io both have very good transit and peering for anycast due to having matching transit providers within regions and globally.

Both anycast networks needed a lot of configuration with BGP communities for traffic engineering and are working very well.

Our anycast networks are deployed with 2x IPv4 /24 obtained we quickly obtained for free from ARIN via NRPM 4.10 + NRPM 4.5.

We could use our own IPv6 space everywhere we have BGP if we wanted to do that since we have a /36 which can be expanded into more space reserved for us.

ARIN has approved our request for an IPv4 /22 via their waitlist but it will take around 18 to 36 months for the waitlist to progress to our request. For now, we're using an IPv4 /24 loaned to us for free by a Romanian LIR supporting GrapheneOS for our unicast Toronto IP space.

Our current bare metal server at Xenyth is sponsored by them and used as an update mirror which is using our IP space. However, our main use case for the IP space in Toronto is for our mail server which we're planning to host on-premises and tunnel the traffic through Xenyth.

Xenyth has support for routing to multiple servers announcing the same publicly routable IP space by announcing smaller blocks from specific servers so we can also pay for additional Xenyth bare metal servers or VPS instances. We'll likely be using it a fair bit in the future.

Our plan for our IPv4 /22 from the ARIN waitlist is deploying a single /24 in each of Toronto, Miami, Los Angeles and Seattle. Once we have a /22 deployed for North America, we'll qualify for getting out-of-region space on ARIN via the waitlist or transfers for Europe, Asia, etc.

The interesting parts of our BGP setup can be seen in https://github.com/GrapheneOS/ns1.grapheneos.org where we have our BGP community configuration for each ns1/ns2 location along with our setup for region steering via GeoDNS + anycast server location and failover via health checks from our DNS servers.

11
4

Changes in version 145.0.7632.26.0:

  • update to Chromium 145.0.7632.26

A full list of changes from the previous release (version 144.0.7559.109.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

12
14

Tags:

  • 2026012800 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026012100 release:

  • FusedLocationProvider: restore pre-16-QPR1 GNSS usage policy of using GNSS for both balanced and high power requests instead of only high power requests since many GrapheneOS users don't enable network location and network location may not always be accessible such as temporarily not having internet access
  • Sandboxed Google Play compatibility layer: add special case for sandboxed Play services making it so users granting the SMS permission enables reading SMS addressed to apps using the Google Play services client library (Android 16 QPR2 prevented using the SMS permission to read SMS addressed to other apps so a special case is needed for apps which use Google Play services to handle SMS-based authentication)
  • Sandboxed Google Play compatibility layer: prevent sandboxed Play Store attempting to install the "Device configuration" package which is not used on GrapheneOS and serves no purpose
  • avoid compatibility issues with apps doing misguided anti-tampering checks by changing the initial call stack for secure app spawning (exec spawning) to match the standard zygote-based spawning
  • Settings: require device restart after changing the secure app spawning setting
  • Sandboxed Google Play compatibility layer: update Android Auto configuration UI to Material 3 Expressive
  • add workaround for upstream system_server startUserInBackgroundTemporarily crash
  • fix GrapheneOS support for recording permission usage history for a broader set of permissions
  • Dialer: set CallStyle for call notifications to improve the user interface and replace our temporary workaround of disabling notification grouping for it
  • Network Location: rename "GrapheneOS proxy" option to "GrapheneOS Apple proxy" for clarity
  • Network Location: add "Apple China" server choice required for China data due to China's laws about mapping the country (currently no proxy due to poor connectivity to and from China causing reliability issues with connecting to Apple's servers in China from ours but we plan to offer it as an option in the future)
  • Pixel 8a, 9th gen Pixels and 10th gen Pixels: disable NTP usage in Samsung gnssd which isn't as useful on GrapheneOS due to reducing the system time update threshold from 2000ms to 50ms along with avoiding us needing to redirect this to our own NTP service as we did for Qualcomm xtra-daemon
  • update code for disabling reporting of harmless fingerprint-service.goodix crash
  • improve user interface for Network/Sensors permissions in the permission manager
  • fix minor Material 3 Expressive styling issues for the Contact Scopes and Storage Scopes configuration UI
  • adevtool: raise minimal supported Node.js version to 24
  • adevtool: disallow running adevtool as root
  • adevtool: check for presence of prebuilts dirs at startup
  • kernel (6.12): update to latest GKI LTS branch revision including update to 6.12.67
  • Vanadium: update to version 144.0.7559.109.0

All of the Android 16 security patches from the current February 2026, March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2026012801 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044, CVE-2026-0047, CVE-2026-0049
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-32348, CVE-2025-48600, CVE-2025-48615, CVE-2025-48617, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2025-48654, CVE-2026-0011, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025, CVE-2026-0033, CVE-2026-0034, CVE-2026-0035, CVE-2026-0036, CVE-2026-0048, CVE-2026-0050

For detailed information on security preview releases, see our post about it.

13
7

Changes in version 144.0.7559.109.0:

  • update to Chromium 144.0.7559.109
  • activate Nordic EasyList for Danish, Finnish, Icelandic and Swedish rather than only Norwegian (both variants) and Greenlandic (this change has been included since Vanadium Config version 150)
  • add EasyList Adblock Warning Removal List (this change has been included since Vanadium Config version 151)
  • extend rebranding of Chrome/Chromium to Vanadium

A full list of changes from the previous release (version 144.0.7559.90.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

14
12

Tags:

  • 2026012100 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026011300 release:

  • fix an upstream infinite loop bug in ProtoFieldFilter.skipBytes() causing an upstream system_server issue leading to the OS being unusable in early boot for a tiny subset of users since Android 16 QPR2 (there are a bunch of reports of these symptoms with the stock Pixel OS)
  • libpng: backport security patches
  • remove unused INTERNET permission from Pixel Camera Services since GrapheneOS doesn't support the Pixel Connected Cameras feature
  • kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.161
  • kernel (6.6): update to latest GKI LTS branch revision
  • kernel (6.12): update to latest GKI LTS branch revision including update to 6.12.66
  • Vanadium: update to version 144.0.7559.59.0
  • Vanadium: update to version 144.0.7559.59.1
  • Vanadium: update to version 144.0.7559.76.0
  • Vanadium: update to version 144.0.7559.76.1
  • Vanadium: update to version 144.0.7559.90.0

All of the Android 16 security patches from the current February 2026, March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2026012101 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2026-0039, CVE-2026-0040, CVE-2026-0041, CVE-2026-0042, CVE-2026-0043, CVE-2026-0044
  • High: CVE-2025-22424, CVE-2025-22426, CVE-2025-32348, CVE-2025-48561, CVE-2025-48615, CVE-2025-48617, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2025-48654, CVE-2026-0011, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025, CVE-2026-0033, CVE-2026-0034, CVE-2026-0036
  • Unclassified: CVE-2026-0035

For detailed information on security preview releases, see our post about it.

15
4

Changes in version 144.0.7559.90.0:

  • update to Chromium 144.0.7559.90
  • extend upstream motion sensors toggle with a per-site toggle (Vanadium already had the global toggle disabled by default)
  • disable autofill server support (already disabled by Vanadium Config 148)
  • extend support for supplementary language/regional content filters to a larger set (Arabic, Bulgarian, Spanish, French, German, Hebrew, Indian, Indonesian, Italian, Korean, Lithuanian, Latvian, Dutch, Nordic, Polish, Portuguese, Romanian, Russian, Vietnamese and Chinese)

A full list of changes from the previous release (version 144.0.7559.76.1) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

16
5

Changes in version 144.0.7559.76.1:

  • extend support for language-specific content filters from German to cover additional languages supporting by the other EasyList variants (Bulgarian, Hebrew, Indonesian, Dutch, Vietnamese, Chinese) which can be expanded further to more EasyList-affiliated lists in the near future
  • add workaround for upstream regression for the HTTPS-only mode user interface on Android which can be replaced by a backport of their fix in the near future

A full list of changes from the previous release (version 144.0.7559.76.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

17
6

Changes in version 144.0.7559.76.0:

  • update to Chromium 144.0.7559.76
  • always reduce WebView user agent

A full list of changes from the previous release (version 144.0.7559.76.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

18
13

Tags:

  • 2026011300 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026011000 release:

  • update to January 2026 Pixel driver/firmware code for the subset of devices with a January 2026 release
  • allow user to set any account as the default contacts account (since Android 16 QPR1, this was restricted to Google accounts for the stock Pixel OS and nothing permitted at all for AOSP)
  • kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.159
  • kernel (6.6): update to latest GKI LTS branch revision
  • kernel (6.12): update to latest GKI LTS branch revision

All of the Android 16 security patches from the current January 2026, February 2026, March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2026011301 security preview release. List of additional fixed CVEs:

  • High: CVE-2025-32348, CVE-2025-48561, CVE-2025-48615, CVE-2025-48617, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2025-48654, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025, CVE-2026-0033, CVE-2026-0034, CVE-2026-0035, CVE-2026-0036

For detailed information on security preview releases, see our post about it.

19
4

Changes in version 144.0.7559.59.1:

  • restore disabling special search engine user interface specific to Google search
  • backport fix for DrumBrake WebAssembly compatibility issues

A full list of changes from the previous release (version 144.0.7559.59.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

20
23

Tags:

  • 2026011000 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2026010800 release:

  • reimplement the standard Android USB data signal API with our hardware + software USB blocking functionality to preserve support for the device admin and lockdown mode features for fully toggling off USB while upgrading it to use hardware blocking (this was omitted in the previous Alpha-only release)
  • fix regression in the last release causing sandboxed Google Play breakage in a subset of secondary users caused by the phenotype flag changes in the previous release
  • Sandboxed Google Play compatibility layer: add stub for ContentResolver.acquireUnstableProvider()
  • fix the Terminal virtual machine management app not working in a secondary user Private Space (GrapheneOS adds the ability to use the Terminal app in secondary users and also adds the ability to use Private Space in secondary users, so the combination of those things resulted in this being possible but the upstream code was incompatible with it)
  • Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold: add high EMF (PWM) mode opt-in to the Settings app

All of the Android 16 security patches from the current January 2026, February 2026, March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2026011001 security preview release. List of additional fixed CVEs:

  • High: CVE-2025-32348, CVE-2025-48561, CVE-2025-48615, CVE-2025-48617, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2025-48654, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025, CVE-2026-0033, CVE-2026-0034, CVE-2026-0035

For detailed information on security preview releases, see our post about it.

21
21

Tags:

  • 2026010800 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2025122500 release:

  • raise declared patch level to 2026-01-05 which has been provided since we moved to Android 16 QPR2 in December due to Pixels shipping CVE-2025-54957 in December
  • re-enable the system keyboard at boot if it's disabled
  • switch to the system keyboard when device boots to the Safe Mode
  • add "Reboot to Safe Mode" power menu button in Before First Unlock state to make Safe Mode much more discoverable for working around app issues such as a broken third party keyboard
  • add workaround for upstream UsageStatsDatabase OOM system_server crash
  • add workaround for upstream WindowContext.finalize() system_server crash
  • disable buggy upstream disable_frozen_process_wakelocks feature causing system_server crashes for some users
  • Sandboxed Google Play compatibility layer: fix phenotype flags not working in Play services clients
  • Sandboxed Google Play compatibility layer: add MEDIA_CONTENT_CONTROL as a requested permission for Android Auto as part of our toggles for it to avoid needing to grant the far more invasive notification access permission
  • Sandboxed Google Play compatibility layer: extend opt-in Android Auto Bluetooth support to allow A2dpService.setConnectionPolicy() to fix Bluetooth functionality (previously worked around with a GmsCompatConfig update avoiding a crash)
  • switch to new upstream PackageInstallerUI implementation added in Android 16 QPR2 and port our changes to it
  • update SQLite to 3.50.6 LTS release
  • add an extra layer of USB port protection on 10th gen Pixels based on upstream functionality to replace our USB gadget control which was causing compatibility issues with the Pixel 10 USB drivers
  • allow SystemUI to access NFC service on 10th gen Pixels to fix the NFC quick tile
  • disable the upstream Android USB data protection feature since it conflicts with our more advanced approach and causes issues
  • issue CHARGING_ONLY_IMMEDIATE port control command in more cases
  • fix an issue in our infrastructure for spoofing permission self-checks breaking automatically reading SMS one-time codes for certain apps
  • add workaround for upstream KeySetManagerService system_server crash causing a user to be stuck on an old OS version due to it causing a boot failure when booting a the new OS version after updating
  • wipe DPM partition on 10th gen Pixels as part of installation as we do on earlier Pixels since it's always meant to be zeroed on production devices
  • Settings: disable indexing of the unsupported "Parental controls" setting which is not currently available in AOSP
  • Settings: disable redundant indexing of widgets on lockscreen contents which is already indexed another way
  • skip all pseudo kernel crash reports caused by device reboot to avoid various false positive crash reports
  • Vanadium: update to version 143.0.7499.192.0

All of the Android 16 security patches from the current January 2026, February 2026, March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2026010801 security preview release. List of additional fixed CVEs:

  • High: CVE-2025-32348, CVE-2025-48561, CVE-2025-48615, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025

For detailed information on security preview releases, see our post about it.

22
7

Changes in version 144.0.7559.59.0:

  • update to Chromium 144.0.7559.59

A full list of changes from the previous release (version 143.0.7499.192.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

23
8

Changes in version 143.0.7499.192.0:

  • update to Chromium 143.0.7499.192
  • fix obscure crashes from removing Google service related settings identified by the Chromium test suite (not happening for users in practice)

A full list of changes from the previous release (version 143.0.7499.146.0) is available through the Git commit log between the releases.

This update is available to GrapheneOS users via our app repository and will also be bundled into the next OS release. Vanadium isn't yet officially available for users outside GrapheneOS, although we plan to do that eventually. It won't be able to provide the WebView outside GrapheneOS and will have missing hardening and other features.

24
14

We currently have sponsored update mirrors in Toronto (Xenyth), Miami (ReliableSite) and Los Angeles (ReliableSite). Each of these are 10Gbps servers we manage ourselves. Tempest's new ownership is withdrawing the sponsorship for the one in London which was already not enough.

Our overall traffic for updates peaks around 40Gbps for the largest releases for quarterly and yearly Android releases. Average usage over a month is below 2Gbps. We shipped Android 16 QPR2 after it was released earlier this month so the next major update will be in March 2026.

We could easily afford to start paying for the Tempest server in London but it lacks IPv6 and has issues with network downtime. We also aren't interested in paying a company sending us an ultimatum in the holiday season where we have 6 days to start paying or it's taken down.

For now, we can update our GeoDNS configuration to split Europe between Toronto and Miami combined with using Los Angeles for the rest of Asia. We can afford to pay for update servers in Europe ourselves if needed but sponsors are nice for this to avoid overpaying for bandwidth.

We already planned to start paying for at least 2 powerful dedicated servers to provide our own geocoding service instead of only a proxy (https://nominatim.org/release-docs/latest/admin/Installation/#hardware). For updates, a lot of providers charge for 10Gbps bandwidth as if it's used at 100% capacity continuously or just overcharge.

25
29

Tags:

  • 2025122500 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, Pixel 10 Pro Fold, emulator, generic, other targets)

Changes since the 2025121700 release:

  • restore support for bypassing carriers disallowing choosing the cellular network mode (this was lost in a recent major version migration such as the port to Android 16 QPR1 but we aren't sure exactly when it regressed)
  • remove poorly designed upstream end session button on the lockscreen (it remains available in the power menu)
  • enable feature flag for new upstream end session button in the user switcher
  • switch to vendor files from 2nd December 2025 release (BP4A.251205.006.E1) for devices with it available
  • enable lockscreen widget support
  • fix upstream system_server crash in NotificationHistoryProtoHelper
  • Wi-Fi HAL: ignore debug logging requests on all Pixels with MTE support to avoid a crash from detecting an invalid memory access in the upstream code
  • Sandboxed Google Play compatibility layer: add support for redirecting Google Play location service requests from within Google Play services itself which means the GrapheneOS provided network location will work for internal Play services features such as Google Maps location sharing when redirecting to the OS is enabled (which is the default) and the Location permission is granted to it
  • Sandboxed Google Play compatibility layer: force redirecting Google Play location service requests from within Google Play services and Android Auto when the Location permission is disabled for better error handling (neither properly handles the Location permission not being granted since it's always granted on any Google Mobile Services OS in practice instead of being explicitly opt-in)
  • Sandboxed Google Play compatibility layer: fix a compatibility issue with the Chromium test suite
  • Network Location: improve position estability accuracy and stability
  • Network Location: prevent potential division by zero exception
  • Network Location: improve experimental Wi-Fi RTT support which is still disabled in production
  • kernel (6.1): update to latest GKI LTS branch revision
  • kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.119
  • kernel (6.6): disable CONFIG_TLS to reduce attack surface
  • kernel (6.12): update to latest GKI LTS branch revision including update to 6.12.63
  • kernel (6.12): disable CONFIG_TLS to reduce attack surface
  • include configuration for thermometer on 10th gen Pixels
  • adevtool: auto-detect filesystem image type (ext4 vs. EROFS)
  • adevtool: add support for canary builds
  • adevtool: improve performance
  • remove obsolete workaround for using a prebuilt recovery extension

All of the Android 16 security patches from the current January 2026, February 2026, March 2026, April 2026, May 2026 and June 2026 Android Security Bulletins are included in the 2025121701 security preview release. List of additional fixed CVEs:

  • High: CVE-2025-32348, CVE-2025-48561, CVE-2025-48630, CVE-2025-48641, CVE-2025-48642, CVE-2025-48644, CVE-2025-48645, CVE-2025-48646, CVE-2025-48649, CVE-2025-48652, CVE-2025-48653, CVE-2026-0014, CVE-2026-0015, CVE-2026-0016, CVE-2026-0017, CVE-2026-0018, CVE-2026-0020, CVE-2026-0021, CVE-2026-0022, CVE-2026-0023, CVE-2026-0024, CVE-2026-0025

2025121701 provides at least the full 2026-01-01 Android and Pixel security patch level but will remain marked as providing 2025-12-05.

For detailed information on security preview releases, see our post about it.

view more: next ›

GrapheneOS [Unofficial]

4024 readers
21 users here now

Official announcements from the GrapheneOS project.

Subscribe to this community or add it to your RSS reader in order to be notified about new releases and important updates.

Search c/GrapheneOS.

For discussions about the GrapheneOS project, visit our forum or join our community chat.

Our Code of Conduct.

GrapheneOS is a privacy and security focused mobile OS with Android app compatibility. This is a community based around the GrapheneOS projects including the hardened Android Open Source Project fork, Auditor, AttestationServer, the hardened malloc implementation and other projects.

Please use our official install guides for installation and check our features pageusage guide and FAQ for information before asking questions in our discussion forum or chat rooms to get as much information as possible from what we've already carefully written/reviewed for our site.

Contact the moderators of this community if you have any questions or concerns.

founded 4 years ago
MODERATORS