Does Graphene OS maintain the privacy of notifications from being recorded by third parties?
I remember reading an article where the government and Google were able to read notifications and record them from every android device. I wonder if Graphene might have patched this problem, and if not, do they have any plans to do so?
The issue lies with Google's FCM (Firebase Cloud Messaging) system, so it's not something GrapheneOS can really fix. As far as I know FCM doesn't offer a way to encrypt notification content. Some apps like Signal work around this by instead of sending the message content, they send a little "wake up" notification. This tells Signal on your phone to wake up and it goes and retrieves the new message.
If you don't install Google Play Services, you won't be impacted. But you'll also not get notifications for most applications. There is an alternative push notification system called UnifiedPush which allows you to choose any server to handle your notifications (and even self host it). But it does require both the service and the app to support it, so it's not very wide spread yet.
I've never worked directly with FCM, but that's my understanding of the issue. I don't know about WhatsApp. But it may do the same thing as Signal where the notification is just a wake up call and then the app connects directly to the WhatsApp servers to get the actual message.
Firebase is a platform/service provided by Google, so it makes sense that the content goes thru Google's servers.
Also, E2EE in a closed-source app like WhatsApp, run by a nefarious corporation like Meta, was always a joke concept, a marketing ploy at best. People who are truly concerned about their privacy would never touch WhatsApp.
It's mostly a power efficiency thing. Before push notifications were the norm, most apps used a polling method. They had the application send a request every X seconds asking "anything new". There wasn't coordination between apps, so even every app checked once every 30s, it likely wouldn't be on the same 30s. This caused the device to wake up a lot and never let it switch into low power mode.
A push notifications system like FCM or UnifiedPush means only a single application needs to run in the background. It maintains a persistent connection to the push notification service and waits for a message. When it receives one it wakes up the relevant app and passes it the details.
Essentially, the apps which don't use Google FCM service are not affected (from what I understand?). I assume that there isn't a problem on the client-side and this exploit works purely because Google stores these notifications.
Anything using FCM will be effected. UnifiedPush which I mentioned I don't believe has an option to encrypt notification content either. Using it you'd already at least have the option of using a provider with a better privacy policy or self hosting it.
I don't believe has an option to encrypt notification content either.
This is not an option you would actually want from any service.
You don't want to be giving the plain text message to anyone to encrypt. Instead the notification contents should be given to the service provider (FCM or anyone else) already encrypted and only able to be decrypted by the app.
I believe apps working without FCM should be fine, or at least require more effort for third parties like law enforcement to intercept. There's nothing preventing the NSA from listening in on the notifications of alternatives either, of course. Ideally, all notification services have their notification encrypted end-to-end. If app developers do that, FCM should be fine.
Thanks, I'll go read some more. I'm trying to move away from WhatsApp and wanted to run Signal in my main profile on Graphene. I hope I can use it without FCM there.
Signal does have a fallback if FCM is unavailable. It supposedly uses slightly more battery, but I can't say I noticed it. I've swapped to using Molly which is a fork of Signal which implements UnifiedPush (among some other features).