pull down to refresh
223 sats \ 0 replies \ @final 9h \ parent \ on: France Attack On Graphene OS tech
No idea why these articles always try and reference a criminal case to attempt to make us look bad and responsible, when the example is always someone caught red handed, arrested and being charged. We also can't know who any users are because it's an open source project anyone can change the code and run their own version of... Shocking! Doesn't sound like we are enabling any crime to me if theyre being caught. Maybe they should ask the same questions to the teams of Android, LLVM or Linux who make most of the code.
There is no feature that just 'mysteriously' resets itself. The only feature is the duress password, which is an overt and well documented feature. This is not characteristic of GrapheneOS. If there is an app doing this, ANY Android device can do it.
Or that they are a important or at-risk individual with additional security needs other commercial off the shelf device and operating system setups aren't providing? Why do they make malicious assumptions?
Is enabling Lockdown Mode on your iPhone also an intent to conceal?
Anyone getting GrapheneOS from "unlisted YouTube channels" and the "darknet" lacks reading comprehension. Whatever these are, they aren't by us and would be an infringement on our trademarks. We have a public chat bridged to many mainstream platforms and a surface web site... Not to mention we ban anybody suspected of being involved in anything universally considered criminal activity.
Note they kept talking about us like we are a business selling a product. We aren't a business and aren't selling anything.
Not even a GrapheneOS feature. Completely made up attribution. If there's an app doing this, then again, any Android device applies.