Conversation

I received enough Bitcoin to buy a Pixel 3, so I'll have one soon and can extend the Auditor app with the relevant security features added by the new generation of hardware. twitter.com/DanielMicay/st I'll also be testing other components like the hardened malloc implementation.
Quote Tweet
I need a Pixel 3 for advancing my mobile security research. I don't have access to a current generation mobile device with a Snapdragon 845, the Linux 4.9 LTS with CFI and a StrongBox keymaster implementation. Bitcoin address for contributing: 34J5mcUveTUr99ZNB2SnFxCPFjXQCAxyuB.
Show this thread
1
13
Replying to
Few of these discovered bugs are security issues but rather latent memory corruption occurring during regular use. Some is quite concerning even without it being a clear security issue though and it needs to be worked through to be able to use the hardened malloc implementation.
1
Portable AOSP code is much more heavily tested with ASan than the desktop Linux stack so it's easier to deploy these features for real. However, device-specific code on both platforms is much more problematic, particularly for mobile devices. It's a steady stream of new bugs too.
1
It's one of the main reasons that hardened builds of AOSP aren't sustainable without a team of developers. The mitigations uncover too many issues and most of the time ends up being spent resolving upstream bugs and application bugs rather than actually doing more hardening work.
1
2
These problems come and go between releases, particularly major releases. It's a huge part of the burden of porting to each new major release. It ends up being mandatory to move to major releases quickly too, since otherwise full security updates wouldn't be available anymore.
1
Pixel phones have been upgraded to Android 9.0. Older branches of AOSP are still maintained, but the device-specific components for Pixels are only maintained for Android 9.0. If you're using Android 8.1.0, you'll be in the situation of only having half the security updates...
1