smh at people freaking out in my mentions that they ~might~ be able to infer something about my screen lock passphrase from a redacted non-monospace font
people. it’s a SCREEN LOCK PASSPHRASE. two minutes of physical access and someone like me can reflash your firmware instead
Conversation
Replying to
honestly my fear would be someone swapping out my device for a different one entirely and capturing my credentials with the new one before I notice. you authenticate yourself to your devices but where are the methods to authenticate your devices to you?
5
3
14
github.com/GrapheneOS/Aud is a project aimed at providing this via hardware-based attestation and hardware-backed keys. It works on an assorted collection of devices but it's strongest on a Pixel 3 or Pixel 3a due to the dedicated, specialized HSM for key storage and attestation.
1
1
1
At the moment, for the use case of verifying before unlocking, a secondary user profile dedicated to this is needed. The intention is to support it directly from the lockscreen: github.com/GrapheneOS/Aud. There are also plans to work towards mitigating proxying the attestations.
i.e. an attacker that has taken your real device could proxy the verification from the fake device and provide the valid attestation from the real device. I don't think suggesting performing the verification in a faraday cage is a real answer, so other mitigations are needed.
1
1
2
There's more information at attestation.app/about and a tutorial at attestation.app/tutorial. It relies on standard hardware features so it can be easily ported elsewhere. It currently supports the stock OS, GrapheneOS and CalyxOS but can support others with verified boot, etc.
1
1
2
Show replies


