And then the problem is that once CameraX ships that, which it has largely done now, Pixels still need to take advantage of it by shipping the 1 extension they provided for CameraX in addition to Camera2. It's frustrating for us Samsung has 5/5 CameraX extensions and they have 0.
Conversation
Most GrapheneOS Camera users are on GrapheneOS where none of the extensions are available since Pixels don't provide it yet. If Samsung had proper alternate OS support keeping hardware security features supported and published easy to use AOSP support we could support those...
1
2
Samsung's flagships actually do meet our baseline security requirements for the stock OS but they don't support using a bunch of the hardware security via an alternate OS. Also, way too many variants of their phones and way too hard to support them not just because that mess.
1
1
Replying to
I remember with the Galaxy fold 2 they disabled cameras on the stock rom if the bootloader was unlocked. Very not alternate OS friendly
1
Replying to
That's essentially how it works with many of the hardware security features on almost every single non-Pixel. It's mostly that they don't want to bother implementing them. Some devices had partially working verified boot for alternate OSes but it was insecure/broken.
1
1
Samsung seems to be the only non-Pixel phone currently available with Weaver support (grapheneos.org/faq#encryption) which is one of the hardware security features we consider mandatory. Problem is that most devices have fallen literally years behind Pixels in a lot of security areas.
1
2
To sum up the importance of Weaver: on Samsung flagship or Pixel, a random 6 digit PIN gives you highly secure encryption that can only be bypassed by exploiting the secure element.
On nearly all other Android devices, 6 digit PIN is trivially bypassed. You just need OS exploit.
1
2
On other devices, you literally need a 7 diceware word passphrase (~90 bit entropy or higher) to have working encryption. That seems quite important for most users, and yet no one talks about it. There are many other examples. Most vendors really don't care about security.
1
2
You still ideally have a high entropy passphrase on a Pixel, but 6 digit random PIN does hold up to even sophisticated attackers unless they find a secure element exploit, which is increasingly hard, especially with Pixel 6 Titan M2 where ARM Cortex secure element was replaced.
1
2
Replying to
They don't even mention it as a recommendation:
source.android.com/compatibility/
The only thing they require is some kind of TEE integration which makes it so that brute force attacks can't be offloaded to a cluster but rather you need to do it on the device, unless you bypass this.
TEE hardware-bound key derivation integration helps to make a decent passphrase much more secure. It can't really increase the value of a random 6 digit PIN because it doesn't take long to iterate through all the possible values on the device despite key derivation work factor.
1
For Pixels, due to Weaver, the 2 most sensible choices are either a random 6 digit PIN (most people) or 7 random diceware words as a passphrase. Either you rely on the hardware security features or you don't.
1
1
Show replies

