Google fixes two Pixel zero-day flaws exploited by forensics firms. GrapheneOS discovered and reported these flaws.
Google fixes two Pixel zero-day flaws exploited by forensics firms. GrapheneOS discovered and reported these flaws.
Google has fixed two Google Pixel zero-days exploited by forensic firms to unlock phones without a PIN and gain access to the data stored within them.
More Information: GrapheneOS Mastodon account
Friendly reminder GrapheneOS relies on donations from those who realize the value it provides! https://grapheneos.org/donate
42 0 ReplyPermanently Deleted
26 0 Replydisclosed active exploitation
So, not a fucking zero day.
I'm confused. Isn't an active exploit that hasn't been patched yet, by definition, a zero day? So the release of a new patch that closes an actively exploited vulnerability patches a zero-day?
7 0 ReplyPermanently Deleted
13 0 Reply
I was so excited to see zero-day in the title, and then I was disappointed that zero-day was in the title.
5 0 ReplyIt can be a zero click 🫣
3 0 Reply
Interestingly, GrapheneOS isn't secure enough for Niantic games
20 0 Reply@deFrisselle @ForgottenFlux Perhaps #GrapheneOS (and other #custom-rom) is too secure? Because it prevents surveillance. Just thinking. 😉
11 0 ReplyWell that's mildly disappointing. Been on GrapheneOS for a while and been considering picking up Pokemon Go just to get out and about more.
9 0 ReplyPokemon Go works for now Ingress is a no go Not sure about the other Niatic games
1 0 Reply
explain?
2 0 ReplyNiantic doesn't consider it secure enough due to the Google Play Store security check only being Basic not Strong
2 0 Reply
thats google safety net which only allows apps that use that check to be installed on google verified OS's which graphene cant become
1 0 Reply
This is how the ecosystem improves! Kudos to the Graphene team!
18 0 ReplyI hate talking like a zoomer, but damn it, Graphene is the GOAT, as usual
18 0 ReplyThe acronym GOAT has been around since well before those zoomers were born, probably before most of their parents were born, so don't feel too embarrassed!
1 0 Reply
Any chance we'll be able to use these to gain root on a Pixel without unlocking the bootloader?
3 0 ReplyWhat is in the dumped memory (for CVE-2024-29745 )?
Can the device encryption keys be extracted from this ? Or is it more random data?
2 0 Reply