GrapheneOS on Nostr: We extended wipe-without-reboot with extra wiping and use it as part of our duress ...
We extended wipe-without-reboot with extra wiping and use it as part of our duress PIN/password feature.
Forensic companies are still able to exploit stock OS Pixels, but reset attack mitigation helps prevent bypassing GrapheneOS security via firmware.
https://grapheneos.social/@GrapheneOS/112826160880324005Published at
2024-09-03 19:58:52Event JSON
{
"id": "a79482167d6c0a56debb480063576f23a8039706b10682cda731f65e12ef95d0",
"pubkey": "5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed",
"created_at": 1725393532,
"kind": 1,
"tags": [
[
"e",
"232545d95025e498aa829426eb71d51d68bc46883124493fadc69ee100962438",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/113075390524722562",
"activitypub"
]
],
"content": "We extended wipe-without-reboot with extra wiping and use it as part of our duress PIN/password feature.\n\nForensic companies are still able to exploit stock OS Pixels, but reset attack mitigation helps prevent bypassing GrapheneOS security via firmware.\n\nhttps://grapheneos.social/@GrapheneOS/112826160880324005",
"sig": "ce4d75c76e88a43d876ac68a71d47418b5b7c399a8daf680c38c594c3d4cbc2a5fbd014d56433c0d29107296cc6455467fa2c85559559c5f50ce89410bbef761"
}