Conversation

Replying to
it's beneficial because flashing is hard and most people rightfully don't want learn how fastboot, adb, etc work, and seek out convenience. they'll find it either with the first party, GrapheneOS, or a potentially malicious or negligent third party. here, WebUSB is harm reduction
1
76
I'm not sure if WebUSB could have been designed in a way that makes harm negligible. I know that it could have been designed to minimize potential harm, and it clearly wasn't (Chrome just lets you do ~anything to ~any device), and I find that unfortunate.
3
59
now that I re-read what I wrote above it sounds way more pessimistic than I intended, so let me clarify that:
Quote Tweet
Replying to @taviso @analogist_net and @XMPPwocky
yes. I agree that it's often far better, too. I just think it doesn't go far enough! basically, I want WebUSB to be more like WebAssembly: not only merely isolate previously privileged code, but advance state of the art beyond that, like WASI does with the ObjCap stuff
1
21
Replying to and
It also means it depends on installing the same fastboot udev rules as usual on Linux which annoys me. I had to add that back to grapheneos.org/install/web since I'd deleted it when I copied the CLI installation guide there expecting that it wasn't going to be needed.
2
1
For common USB devices, the udev rules already exist. It's actually quite annoying that it's not more generic. I don't really understand the point of someone having to maintain github.com/M0Rf30/android in order to authorize local users (users physically at a session) to use it.
1
1
Show replies
not only is the proposed solution to reflashing attacks is "just sign firmware" but they do not mention ROM bootloaders at all. which is a conspicuous omission, the Twinkie WebUSB frontend has a flasher that uses ST's DFU bootloader which cannot check signatures.
1