<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-03T23:19:34Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by pixelschubsi</title>
  <author>
    <name>pixelschubsi</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1tekutp4hugeck74ujhu9gt3nqps7pj45l0ddensmadlsna7w0d4sv7rm0u.rss" />
  <link href="https://yabu.me/npub1tekutp4hugeck74ujhu9gt3nqps7pj45l0ddensmadlsna7w0d4sv7rm0u" />
  <id>https://yabu.me/npub1tekutp4hugeck74ujhu9gt3nqps7pj45l0ddensmadlsna7w0d4sv7rm0u</id>
  <icon></icon>
  <logo></logo>




  <entry>
    <id>https://yabu.me/nevent1qqsqxfnpuwg6e078anvmnmk6pevyq9m89jp8yekqrj8nt4dsvqksetszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk76w7hg</id>
    
      <title type="html">As an app developer that needs to take care of this, I don&amp;#39;t ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqxfnpuwg6e078anvmnmk6pevyq9m89jp8yekqrj8nt4dsvqksetszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk76w7hg" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2ydt9jucwdt8xcgpt3j0asrs44e7f0emupu408pefnmext65v5lgfqjtwt&#39;&gt;nevent1q…jtwt&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;As an app developer that needs to take care of this, I don&amp;#39;t want to open the &lt;a href=&#34;https://grapheneos.org/articles/attestation-compatibility-guide&#34;&gt;https://grapheneos.org/articles/attestation-compatibility-guide&lt;/a&gt; page and copy out the fingerprints for those various devices out and update my local copy of them whenever a new device is supported by GrapheneOS. I just want to have a way to say &amp;#34;I trust whatever GrapheneOS guys consider safe&amp;#34;. In understand Unified Attestation could be that way (if GrapheneOS was to provide a backend for it).
    </content>
    <updated>2026-03-26T23:45:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2ydt9jucwdt8xcgpt3j0asrs44e7f0emupu408pefnmext65v5lgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkpencz9</id>
    
      <title type="html">Notably, if you worry about old and insecure devices (like those ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2ydt9jucwdt8xcgpt3j0asrs44e7f0emupu408pefnmext65v5lgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkpencz9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsd8j4fdcrwauu3yr4gusrdpv648s79avauv7wpzaudez8nzsl3m0chw4r4z&#39;&gt;nevent1q…4r4z&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Notably, if you worry about old and insecure devices (like those still accepted by Play Integrity) as an app developer your just need to make sure to use a backend that would not sign them off. Which may well be one that&amp;#39;s not the hardware manufacturer. I see Unified Attestation more as a decentralized/federated version of Play Integrity that gives app developers control to decide which devices, operating system creators or third-party attestors they trust.
    </content>
    <updated>2026-03-26T23:31:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd8j4fdcrwauu3yr4gusrdpv648s79avauv7wpzaudez8nzsl3m0czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakklku0xe</id>
    
      <title type="html">Are you talking about https://uattest.net/? I had a glimpse at ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd8j4fdcrwauu3yr4gusrdpv648s79avauv7wpzaudez8nzsl3m0czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakklku0xe" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrl86xa6hpjmhl567zea7s6678m8ce2ps4v00fvw2heud65j3sm2qtpuqyy&#39;&gt;nevent1q…uqyy&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Are you talking about &lt;a href=&#34;https://uattest.net/&#34;&gt;https://uattest.net/&lt;/a&gt;? I had a glimpse at it, and they talk about multiple backends and federation of backends. As I understood it, everyone can create a backend and create tokens for devices/OS that they like, it&amp;#39;s then subject for the app developers to accept those tokens, either directly or indirectly through federation. Which means it does allow for competitor OS to also be accepted for as long as the app developer or their selected backends support it.
    </content>
    <updated>2026-03-26T23:24:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd2gn8ltgnxns43y9n3s9ux8g77q5s7qm04pgn2t779v0803syssqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkvgml6a</id>
    
      <title type="html">I&amp;#39;m also genuinely surprised that people believe that ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd2gn8ltgnxns43y9n3s9ux8g77q5s7qm04pgn2t779v0803syssqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkvgml6a" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9p4uaxm68mtmqkfu7tc5a08583vysya4glxw65cm2gt2rqc4m6ycf8d3gj&#39;&gt;nevent1q…d3gj&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;m also genuinely surprised that people believe that ActivityPub, a protocol even named after its purpose, to publish activities, is a good protocol to pursue private instant messaging. The goals of those two couldn&amp;#39;t be more detrimental.&lt;br/&gt;&lt;br/&gt;I do see a purpose of being able to reuse your &amp;#34;ActivityPub identities&amp;#34;, which actually are just WebFinger identities. Maybe someone should specify how to discover XMPP accounts via WebFinger and push that as a solution for AP messaging?
    </content>
    <updated>2025-12-23T11:03:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0lhm503spfm9py5y99mr4u3q2x2hx8mv4x0yrc6hqtrhxjdqq48czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkn04xk6</id>
    
      <title type="html">And no, for this specific articles in Le Parisien, the journalist ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0lhm503spfm9py5y99mr4u3q2x2hx8mv4x0yrc6hqtrhxjdqq48czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkn04xk6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8vw2gvkgth58kmwwz6xar70t7c422mwhnphcw72l6fwpythtdywgngmrj3&#39;&gt;nevent1q…mrj3&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;And no, for this specific articles in Le Parisien, the journalist already confirmed they reached out to PJ after they were hinted at the existence of the internal notice. It was not PJ reaching out to them or asking them to write favorably about them. And I bet this is how it worked for other news outlets. You have not provided any proof that PJ reached out to specific news outlets asking them to write about this.
    </content>
    <updated>2025-11-25T20:55:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8vw2gvkgth58kmwwz6xar70t7c422mwhnphcw72l6fwpythtdywgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkt8znzd</id>
    
      <title type="html">I never claimed it was a single article, I claimed it&amp;#39;s a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8vw2gvkgth58kmwwz6xar70t7c422mwhnphcw72l6fwpythtdywgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkt8znzd" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0ec90m6u4za7sareqr4e24kl5d0gcfejuvj3dyqa9h29nteg8xcchgxdvk&#39;&gt;nevent1q…xdvk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I never claimed it was a single article, I claimed it&amp;#39;s a single story. The story is about PJ instructing local authorities on how to handle GrapheneOS phones. And everything beyond that is journalists asking about how this instructions came about.
    </content>
    <updated>2025-11-25T20:54:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0nkhxpzmw2rhevwk8n3hnd7wvegsytug3y7h2t69hyydznq8kh4szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkxujmkc</id>
    
      <title type="html">It was then that, when this notice circulated widely, some ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0nkhxpzmw2rhevwk8n3hnd7wvegsytug3y7h2t69hyydznq8kh4szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkxujmkc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstepehqrc0tejlehxuy6622ez7tah0fh0j5h8420zg7h9f6gceghq8zffrp&#39;&gt;nevent1q…ffrp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;It was then that, when this notice circulated widely, some journalists would find out and ask PJ for a comment and publish articles about it with their replies. I&amp;#39;m not aware of PJ directly reaching out to news outlets asking them to report on this topic. Please provide proof for your claim that this is what happened.
    </content>
    <updated>2025-11-25T20:15:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstepehqrc0tejlehxuy6622ez7tah0fh0j5h8420zg7h9f6gceghqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkw3h6z9</id>
    
      <title type="html">The notice to local police wasn&amp;#39;t about fearmongering, it was ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstepehqrc0tejlehxuy6622ez7tah0fh0j5h8420zg7h9f6gceghqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkw3h6z9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg9rcfspadhrj99wu4a2hv6zh44akp4xrfa7td45nrcdgls7e4t2cyd2gzm&#39;&gt;nevent1q…2gzm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The notice to local police wasn&amp;#39;t about fearmongering, it was merely instructions how to handle phones with GrapheneOS, notably to be careful to not enter a PIN, as it could be triggering a wipe. This just makes sense to educate law enforcement personnel.
    </content>
    <updated>2025-11-25T20:15:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0xyc2rur9r84yyuxexyj77ttxlhrmqumzjj24rrgzezez8etk9mqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkrrmkac</id>
    
      <title type="html">It&amp;#39;s a single story from law enforcement that is then picked ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0xyc2rur9r84yyuxexyj77ttxlhrmqumzjj24rrgzezez8etk9mqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkrrmkac" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswshe0ad4vltm5fefdqzlkch9j22g3kpm63ppjfrwcrjlwyrrjlgqdvlnlp&#39;&gt;nevent1q…lnlp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;It&amp;#39;s a single story from law enforcement that is then picked up by multiple media. This is literally how media publishing works. One press release leads to multiple newspapers writing about it. That doesn&amp;#39;t make it a coordinated effort. Nobody is coordinating anything, law enforcement shares information and news outlets report what they claim. No news outlet claimed that this is their own research, analysis or anything like that.
    </content>
    <updated>2025-11-25T19:07:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst42n5n90dy3pyrfecy7k0p3jv4gc9xgdrrnjsxq63q7aq4tp2yygzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkms87vx</id>
    
      <title type="html">what does &amp;#34;being threatened&amp;#34; mean? They sent an email and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst42n5n90dy3pyrfecy7k0p3jv4gc9xgdrrnjsxq63q7aq4tp2yygzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkms87vx" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2je3cu4djnuzle2p70j5qhchylp9fk7q5mjt6vamj5mz9uczragcmaaypj&#39;&gt;nevent1q…aypj&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;what does &amp;#34;being threatened&amp;#34; mean? They sent an email and asked friendly? Coordinated media attacks also sounds weird for a single story (that as usual appears in various outlets). Almost as if the GrapheneOS marketing person (as usual) puts things out of proportion for publicity...
    </content>
    <updated>2025-11-25T14:44:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8e8vle8xs52g0zf6qlwxl3733arnfd2z6ex7x9sgyvxnl6nt4f2czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkh63vxy</id>
    
      <title type="html">Here&amp;#39;s just a wild suggestion: Instead of changing ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8e8vle8xs52g0zf6qlwxl3733arnfd2z6ex7x9sgyvxnl6nt4f2czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkh63vxy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2cd7whnqp88jqtkxy03mxp04wl20z8f4hz2ererst62sr2z2sl6qmung6k&#39;&gt;nevent1q…ng6k&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s just a wild suggestion: Instead of changing GrapheneOS, why don&amp;#39;t you report that &amp;#34;security issue&amp;#34; to Google. Either they will fix their client library (improving security for everyone) and give you a bounty for it or they will tell you that it&amp;#39;s not a security issue. It&amp;#39;s less work for you in both cases plus potentially some extra money in form of a bounty.
    </content>
    <updated>2025-10-26T17:36:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswgn6ju2g63aas7f3sjr0wdu3umldqdul2ddfn24qt3jetse3ch0szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakka3fc40</id>
    
      <title type="html">What if @npub1am6…4z5c was to support the same semi-offline ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswgn6ju2g63aas7f3sjr0wdu3umldqdul2ddfn24qt3jetse3ch0szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakka3fc40" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfxqd9hrk5kxu36xhcwxq9qtvgpplafkktjuxv5nteajatfeunzugfhcq50&#39;&gt;nevent1q…cq50&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;What if &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1am6rpn7c44t5c2x6j0tyke9mgpqy6lngc7lxg3ge86mp4q2r3f0qey4z5c&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;BeaconDB&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1am6…4z5c&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; was to support the same semi-offline design for database access that Apple has? I don&amp;#39;t think storing gigabytes of databases with wifi ap and cell towers on end user devices, when they don&amp;#39;t need most of them is the best approach either (that&amp;#39;s why I like GrapheneOS&amp;#39; Apple-based approach).
    </content>
    <updated>2025-10-25T11:44:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9l25y6w8w9prsxx64mx6f70yda8lgtac9mlymqr2l0kv740tr0sszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkzfkklf</id>
    
      <title type="html">I&amp;#39;m not talking about how it technically works under the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9l25y6w8w9prsxx64mx6f70yda8lgtac9mlymqr2l0kv740tr0sszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkzfkklf" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstr75pal8dcvd3ltu92h5tmxg28kmmvfhfncu0r3n36xz90d45pzccrv6dm&#39;&gt;nevent1q…v6dm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;m not talking about how it technically works under the hood, but rather how it works for endusers.&lt;br/&gt;&lt;br/&gt;Although I believe there could be advantages of having a central services for some things. Like, single sign-on with a Google account. I certainly don&amp;#39;t want to enter my Google account password in arbitrary apps, but I might be fine with them signing in and getting a token from my account.
    </content>
    <updated>2025-10-25T11:34:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs096369cdrlds47a2xefs7x9dlyv5w44ng808ez9ejm6auj8n48eczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkerlml9</id>
    
      <title type="html">&amp;gt; stub out more APIs to further expand app compatibility ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs096369cdrlds47a2xefs7x9dlyv5w44ng808ez9ejm6auj8n48eczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkerlml9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswvrh6k22snvjj8yxfasud0sy9g8f77zwlmyyesd2yzpaqcn96fwgx77nr3&#39;&gt;nevent1q…7nr3&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&amp;gt; stub out more APIs to further expand app compatibility without sandboxed Google Play installed.&lt;br/&gt;&lt;br/&gt;So you&amp;#39;re essentially creating a new microG, just directly baked into GrapheneOS. That would be HUGE.
    </content>
    <updated>2025-10-25T11:28:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgy9ul88n0yhk6mz8zq6flnqnj20gd9w8crsur5gd4wsalp8vxn2qzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakka6cps5</id>
    
      <title type="html">FCM might work because it does not use GmsService APIs, but ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgy9ul88n0yhk6mz8zq6flnqnj20gd9w8crsur5gd4wsalp8vxn2qzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakka6cps5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsp83dq8tt3fa56k6k8prndkn4x20yfktljmua4qzkmck773ex86xst642mg&#39;&gt;nevent1q…42mg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;FCM might work because it does not use GmsService APIs, but rather uses the very old C2DM API. Which makes sense because the functionality of push notifications predates the existence of Play Services.&lt;br/&gt;&lt;br/&gt;However, as push notifications are not meant to include sensitive data, being the delivery agent for push notifications is nothing that needs privilege. In fact, GrapheneOS could provide a C2DM compatible push notification service completely independent of microG and Play Services.
    </content>
    <updated>2025-10-25T11:26:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfzl8cwsgxael4uchmd2446dndtcw6tat8mvq50qqk9vfzf4jp97czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk8eeczp</id>
    
      <title type="html">I tried microG on GOS and many apps that require GMS complained ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfzl8cwsgxael4uchmd2446dndtcw6tat8mvq50qqk9vfzf4jp97czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk8eeczp" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsw2nq2c26arsuhcjpa2uuawmdqdv6vnza7tsh37mhrcjylkktcj5qkh4f28&#39;&gt;nevent1q…4f28&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I tried microG on GOS and many apps that require GMS complained about Play Services not being installed and refused to work, when they worked perfectly fine on LineageOS when installing microG. In both cases microG was installed as a regular sandboxed app, so the culprit must be either the lack of signature spoofing or something else in GOS broke those apps. I was under the impression that this is known and intended behavior, but if you say it &amp;#34;works&amp;#34;, should I file issues for those?
    </content>
    <updated>2025-10-25T11:20:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst2df8h4jclke844l625wkhjth06j8sn7dlae0us0fjn8qggy09gczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkasa0ku</id>
    
      <title type="html">If it&amp;#39;s just in edgecases, why do most apps work well with ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst2df8h4jclke844l625wkhjth06j8sn7dlae0us0fjn8qggy09gczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkasa0ku" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2nvar6vxdpzqa20u4w8suvvte36j0trjnped0akdfurf04wcc6mgxkp8zc&#39;&gt;nevent1q…p8zc&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If it&amp;#39;s just in edgecases, why do most apps work well with microG if signature spoofing is active and don&amp;#39;t work on systems like GrapheneOS that don&amp;#39;t support it? It seems rather the opposite: most features in Play Services require signature spoofing and only some rare don&amp;#39;t.
    </content>
    <updated>2025-10-25T11:12:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv9fa8eue6rtf0dt62fzg80arh9006dhdwxg4wvg5hg0x5q7yp49gzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkjjmrcc</id>
    
      <title type="html">microG doesn&amp;#39;t work properly on GrapheneOS. Only a handful of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv9fa8eue6rtf0dt62fzg80arh9006dhdwxg4wvg5hg0x5q7yp49gzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkjjmrcc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsylh5ndrw97e89rmtxseszugeaf3m4smy25qghrz6gkjuejuw7g4cjh3xe6&#39;&gt;nevent1q…3xe6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;microG doesn&amp;#39;t work properly on GrapheneOS. Only a handful of features work, far less than on systems that provide signature spoofing. So practically, it&amp;#39;s not really possible to use microG on GrapheneOS. All you can do is install it and see most apps not working anyway.&lt;br/&gt;&lt;br/&gt;If it wasn&amp;#39;t to bypass signature checks, why would you make an effort to put original GmsCore signature at &lt;a href=&#34;https://github.com/GrapheneOS/platform_packages_apps_GmsCompat/blob/219b4c2895d30ebb4d0cdea2a57f25d0df269362/lib/src/app/grapheneos/gmscompat/lib/sysservice/client/GclPackageManager.java#L41&#34;&gt;https://github.com/GrapheneOS/platform_packages_apps_GmsCompat/blob/219b4c2895d30ebb4d0cdea2a57f25d0df269362/lib/src/app/grapheneos/gmscompat/lib/sysservice/client/GclPackageManager.java#L41&lt;/a&gt; ? Couldn&amp;#39;t you just keep it empty or insert a dummy signature?
    </content>
    <updated>2025-10-25T11:04:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz4s3wncezve9w7vfesn7gdr26w22ccpqs2teydlcvyc6d6ztvhvgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk8dyqt4</id>
    
      <title type="html">I&amp;#39;m actually surprised that you don&amp;#39;t share this opinion, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz4s3wncezve9w7vfesn7gdr26w22ccpqs2teydlcvyc6d6ztvhvgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk8dyqt4" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2ccth3qf8x9qqpwnevlcx2hhl48tld8pjww9qr7xdpw4gafh4hmc9r0q6j&#39;&gt;nevent1q…0q6j&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;m actually surprised that you don&amp;#39;t share this opinion, given that you rightfully pointed out security and privacy issues with microG.&lt;br/&gt;&lt;br/&gt;All I&amp;#39;m saying is that with this change, you open GrapheneOS to some of these security and privacy issues. And I feel you don&amp;#39;t make a serious attempt in trying to understand what I say.&lt;br/&gt;&lt;br/&gt;But hey, if you say that this is the right way to do it in GrapheneOS, do it this way. Wondering when people will come up with a hardened GrapehenOS then...
    </content>
    <updated>2025-10-25T11:00:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2ccth3qf8x9qqpwnevlcx2hhl48tld8pjww9qr7xdpw4gafh4hmczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkte5hd7</id>
    
      <title type="html">I doesn&amp;#39;t matter to me what you call compatibility layer, I ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2ccth3qf8x9qqpwnevlcx2hhl48tld8pjww9qr7xdpw4gafh4hmczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkte5hd7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr6aetrx84r20nt37hvvfs0fsuhnl8mux9kex7s4504k4gcpz9hagmevlsd&#39;&gt;nevent1q…vlsd&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I doesn&amp;#39;t matter to me what you call compatibility layer, I was talking about the code in GmsCompat that I linked above, that creates a fake package info entry with Google signature if no `com.google.android.gms` package is installed. This is clearly intended to bypass third-party apps&amp;#39; signature checks in the same way that signature spoofing for microG bypasses signature checks.&lt;br/&gt;&lt;br/&gt;I&amp;#39;m saying that by adding this, you&amp;#39;re risking security/privacy problems that wouldn&amp;#39;t exist without.
    </content>
    <updated>2025-10-25T10:57:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz74eh4swnwqztdtjzfl3m79c02q3p2m7ege0r6z8vdsc28wjg0kczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkjtrtz5</id>
    
      <title type="html">When uninstalling the official Play Services, apps can receive a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz74eh4swnwqztdtjzfl3m79c02q3p2m7ege0r6z8vdsc28wjg0kczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkjtrtz5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsplf5fp8qqmh0pkax9nyg7f8ap3003ad8teghu4cd46wp04mk998q4qleul&#39;&gt;nevent1q…leul&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;When uninstalling the official Play Services, apps can receive a `android.intent.action.PACKAGE_REMOVED` broadcast so they know they need to no longer assume GMS is installed. With your GmsCompat solution, no such broadcast is sent between the spoof package being &amp;#34;uninstalled&amp;#34; (= the spoofing being stopped) and a malicious package with the same package name installed.
    </content>
    <updated>2025-10-25T10:53:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdxtwjsp8g0xgl5875jdu49f02nlkxp2kcnczswwa695srxmak8sqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkw5yge7</id>
    
      <title type="html">&amp;gt; Apps handling that incorrectly is not related to our ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdxtwjsp8g0xgl5875jdu49f02nlkxp2kcnczswwa695srxmak8sqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkw5yge7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspfyuwsupxxjuezaf2r4j9g3p2cgjv2ctlv27k8s7sa4uf6xgc27suv44zy&#39;&gt;nevent1q…44zy&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&amp;gt; Apps handling that incorrectly is not related to our compatibility layer.&lt;br/&gt;It&amp;#39;s not like apps have a choice which play services client library to use. Does the official Google play services client library do this correctly and ensures there is not race condition here?
    </content>
    <updated>2025-10-25T10:47:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspfyuwsupxxjuezaf2r4j9g3p2cgjv2ctlv27k8s7sa4uf6xgc27szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkg3cfg8</id>
    
      <title type="html">I&amp;#39;m not talking about sandboxed Google Play, I&amp;#39;m talking ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspfyuwsupxxjuezaf2r4j9g3p2cgjv2ctlv27k8s7sa4uf6xgc27szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkg3cfg8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsplf5fp8qqmh0pkax9nyg7f8ap3003ad8teghu4cd46wp04mk998q4qleul&#39;&gt;nevent1q…leul&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;m not talking about sandboxed Google Play, I&amp;#39;m talking about&lt;br/&gt;a) The new GmsCompat fonts provider spoofing the existence of a Google-signed com.google.android.gms without sandboxed play services being installed&lt;br/&gt;b) Apps checking this fall for this spoofing, assuming that original GMS is installed when it is in fact not installed&lt;br/&gt;c) Malicious apps with com.google.android.gms package name being possibly installed after apps performed the check described in (b).
    </content>
    <updated>2025-10-25T10:46:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd7m5qd6jmzmzeg0aphd9e943zs652f6upksgx0knx3339zge6xuqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk5djqng</id>
    
      <title type="html">Because, if the above is true and the GmsCompat functionality ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd7m5qd6jmzmzeg0aphd9e943zs652f6upksgx0knx3339zge6xuqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk5djqng" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2m83lgggudxcsm975736qsw4ay8hwgd3c6jd3umhcaru7hw7dkwcqks0h5&#39;&gt;nevent1q…s0h5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Because, if the above is true and the GmsCompat functionality makes the 1 check pass even without com.google.android.gms installed, couldn&amp;#39;t I technically install a malicious app under com.google.android.gms package name between steps 1 and 2, resulting in potential security/privacy issues?
    </content>
    <updated>2025-10-25T10:39:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2m83lgggudxcsm975736qsw4ay8hwgd3c6jd3umhcaru7hw7dkwczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk505qw8</id>
    
      <title type="html">Just for clarification, you&amp;#39;re saying that if a third-party ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2m83lgggudxcsm975736qsw4ay8hwgd3c6jd3umhcaru7hw7dkwczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk505qw8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswhsqpq5ne28raeqm562jdyjzuevm2uk59veknt8j3z0jpq9adk3qrzvk8f&#39;&gt;nevent1q…vk8f&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Just for clarification, you&amp;#39;re saying that if a third-party app uses the play services client library it doesn&amp;#39;t do the following:&lt;br/&gt;1. Check if com.google.android.gms is installed and that it is signed by Google&lt;br/&gt;2. Connect to services/providers/etc provided by com.google.android.gms
    </content>
    <updated>2025-10-25T10:38:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9pxcz6rfd6cp0fnkz0m9m30nwjqkgmwvfmdqksd0qxayf757ppkczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakktggalu</id>
    
      <title type="html">- microG installs its compatibility layer as ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9pxcz6rfd6cp0fnkz0m9m30nwjqkgmwvfmdqksd0qxayf757ppkczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakktggalu" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswmt4ngytgvur53yjthf463ky82x55gxujrjewke8hl90hlma8mcq96dldn&#39;&gt;nevent1q…dldn&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;- microG installs its compatibility layer as `com.google.android.gms` and makes the system claim it&amp;#39;s signed by Google&lt;br/&gt;- GmsCompat installs its compatibility layer as `app.grapheneos.gmscompat.lib` and makes the system claim there is a `com.google.android.gms` with Google&amp;#39;s signature and makes the system redirect certain requests originally intended for `com.google.android.gms` to GmsCompat.&lt;br/&gt;They&amp;#39;re not the same, but also not far off from how they work in principle.
    </content>
    <updated>2025-10-25T10:34:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswmt4ngytgvur53yjthf463ky82x55gxujrjewke8hl90hlma8mcqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkvtna7q</id>
    
      <title type="html">Well, but for this compatibility layer, you claim to third party ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswmt4ngytgvur53yjthf463ky82x55gxujrjewke8hl90hlma8mcqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkvtna7q" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspuc7p77ye7j3vscfcv4fd0r9uf6ww5fd3k0p6eg5meehxe4va63cmcevsc&#39;&gt;nevent1q…evsc&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Well, but for this compatibility layer, you claim to third party apps that `com.google.android.gms` is installed and that said package has google&amp;#39;s signature, no? I&amp;#39;m not saying you use microG, just that you&amp;#39;re using a similar concept. And sure, having a clean new implementation of these services certainly doesn&amp;#39;t hurt.
    </content>
    <updated>2025-10-25T10:33:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstma5unp6qlp9t8r0c7dgms9gc5jvneu55de3d9w388utqnjsgyeszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk4fltj3</id>
    
      <title type="html">I&amp;#39;m now wondering if we can make use of this to run microG... ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstma5unp6qlp9t8r0c7dgms9gc5jvneu55de3d9w388utqnjsgyeszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk4fltj3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspe2atw270ce4fhjpdpd6yzx0q6d09yqj0vj7ytgmkwxap2fuurnst5ur7s&#39;&gt;nevent1q…ur7s&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;m now wondering if we can make use of this to run microG...&lt;br/&gt;&lt;br/&gt;EDIT: No, not really. The signature spoofing will only happen if no com.google.android.gms is installed. This introduces a race condition (requiring microG to be installed between signature check and an app&amp;#39;s usage of it). So we have the same security impact of microG compatible signature spoofing without the benefit of being able to use microG in practice.
    </content>
    <updated>2025-10-25T09:47:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspe2atw270ce4fhjpdpd6yzx0q6d09yqj0vj7ytgmkwxap2fuurnszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkp4y7ea</id>
    
      <title type="html">Isn&amp;#39;t this essentially adding some sort of signature ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspe2atw270ce4fhjpdpd6yzx0q6d09yqj0vj7ytgmkwxap2fuurnszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkp4y7ea" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvl3a4wmxff5z6py6yk0avm3aq0xcpusdphu4a9trryqfrpjdm2kgjdzpqv&#39;&gt;nevent1q…zpqv&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Isn&amp;#39;t this essentially adding some sort of signature spoofing, a feature GrapheneOS was always very much opposed to adding? What&amp;#39;s the rationale to now consider it acceptable to fake to third-party apps that a package com.google.android.gms signed by Google is installed on the system when it actually isn&amp;#39;t?&lt;br/&gt;&lt;br/&gt;Reference: &lt;a href=&#34;https://github.com/GrapheneOS/platform_packages_apps_GmsCompat/blob/219b4c2895d30ebb4d0cdea2a57f25d0df269362/lib/src/app/grapheneos/gmscompat/lib/sysservice/client/GclPackageManager.java#L37-L43&#34;&gt;https://github.com/GrapheneOS/platform_packages_apps_GmsCompat/blob/219b4c2895d30ebb4d0cdea2a57f25d0df269362/lib/src/app/grapheneos/gmscompat/lib/sysservice/client/GclPackageManager.java#L37-L43&lt;/a&gt;
    </content>
    <updated>2025-10-25T09:41:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspaa5xnd0u9jrclqnv6gdtxv2d3zaujrn39gvtnujyka4axs4lfaszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakks659n9</id>
    
      <title type="html">I was wondering what you think about Signal&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspaa5xnd0u9jrclqnv6gdtxv2d3zaujrn39gvtnujyka4axs4lfaszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakks659n9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstlpm2ht07gg2kqd6fn5yw92ljzzxtgwxtq0k8gxvchsu0an4x2zcay65pa&#39;&gt;nevent1q…65pa&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I was wondering what you think about Signal&amp;#39;s registration_id. It seems to be a longterm device id that is attached to some(?) messages?
    </content>
    <updated>2025-06-10T21:18:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq57g4jcw2x6p7ztyn47q46t3qkka2ng04ekthw532syh0gz7fqsgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk9yg7jy</id>
    
      <title type="html">If those resources and cookies blocked had not been of purpose to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq57g4jcw2x6p7ztyn47q46t3qkka2ng04ekthw532syh0gz7fqsgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk9yg7jy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfqm2wv3zyxwyj5hs26mtqmjanyeu8l9dprk0lgpjjgkm64scwkwqj064l8&#39;&gt;nevent1q…64l8&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If those resources and cookies blocked had not been of purpose to the tracking/ads/... industry, they would not have been requested. Thus, while certainly not perfect, it reduces how much tracking happens and/or how much data is shared and/or how many receive it.&lt;br/&gt;&lt;br/&gt;It might not be perfect, but it did some good. And that&amp;#39;s better than doing nothing just because you can&amp;#39;t be perfect.
    </content>
    <updated>2025-01-27T15:00:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfqm2wv3zyxwyj5hs26mtqmjanyeu8l9dprk0lgpjjgkm64scwkwqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkg3dwts</id>
    
      <title type="html">All you write is correct and still it is totally missing the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfqm2wv3zyxwyj5hs26mtqmjanyeu8l9dprk0lgpjjgkm64scwkwqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkg3dwts" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxh7yrl0lvx939nh7xx6enzh9t33y6qydfu02ssn0xput56pq0gzg503cml&#39;&gt;nevent1q…3cml&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;All you write is correct and still it is totally missing the point.&lt;br/&gt;&lt;br/&gt;Try the following: Install a popular ad blocker into your web browser and configure ad and privacy filters. Now open the developer tools to monitor all requests done. Navigate to a few popular websites and check how many invasive cookies are set and how many tracking endpoints data is sent to. Now reset and repeat the same with the ad blocker disabled.&lt;br/&gt;&lt;br/&gt;You&amp;#39;ll see the blocker blocked a lot.
    </content>
    <updated>2025-01-27T14:57:22Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2500drsnj2unztf27h40prxvaels93hhplsh3renxc04ejvfqa5szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakklags92</id>
    
      <title type="html">And lastly, Google doesn&amp;#39;t even provide proper APIs to pass ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2500drsnj2unztf27h40prxvaels93hhplsh3renxc04ejvfqa5szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakklags92" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf0sns66npf45khuxj7hm4qx464mhd96s87xcgcf4uvnv9y4kja4cf6ystr&#39;&gt;nevent1q…ystr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;And lastly, Google doesn&amp;#39;t even provide proper APIs to pass data into Google Analytics without using their tracking library. So using a tracking blocked which blocks their tracking library in fact does effectively block the app from sending tracking data to Google. Yes, a win against Google is just a small win, but it&amp;#39;s a win that can be reached.
    </content>
    <updated>2025-01-27T14:46:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf0sns66npf45khuxj7hm4qx464mhd96s87xcgcf4uvnv9y4kja4czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkw52kkh</id>
    
      <title type="html">Also, there&amp;#39;s privacy laws (at least here in the EU). ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf0sns66npf45khuxj7hm4qx464mhd96s87xcgcf4uvnv9y4kja4czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkw52kkh" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxn7t97ad7wuqpws05j6k99kuwy4e254fqlnrg7k93vjpmr93732q0k9uy5&#39;&gt;nevent1q…9uy5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Also, there&amp;#39;s privacy laws (at least here in the EU). Forwarding the user&amp;#39;s IP address from your server to Google for Analytics would be illegal without good reason, but connecting to Google servers for Analytics and there for effectively sharing the user&amp;#39;s IP address as well is considered legal because it&amp;#39;s technically required.
    </content>
    <updated>2025-01-27T14:45:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspmx5xqv5wfn8yqt6rh75zvgp5u9npkm5jdvz4n7rnum8dnvkp5vqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkj7djhs</id>
    
      <title type="html">We know that in reality, most websites don&amp;#39;t try to bypass ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspmx5xqv5wfn8yqt6rh75zvgp5u9npkm5jdvz4n7rnum8dnvkp5vqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkj7djhs" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspww32ch6ys52lvm4c9xrwwkzkvrfkgc42ajw7r3ns4yynz75athqt7fhy5&#39;&gt;nevent1q…fhy5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;We know that in reality, most websites don&amp;#39;t try to bypass adblockers. Some try to detect them and block using their websites if you don&amp;#39;t disable them. The same holds true for tracking, where the ROI to build a bypass for the blocker is even lower (because the tracking data really isn&amp;#39;t worth as much). This is of course what we know from the web, but there&amp;#39;s no reason why this should be any different on android apps.
    </content>
    <updated>2025-01-27T14:40:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspww32ch6ys52lvm4c9xrwwkzkvrfkgc42ajw7r3ns4yynz75athqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk7vjmme</id>
    
      <title type="html">You&amp;#39;re right in theory, but not how things work in practice. ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspww32ch6ys52lvm4c9xrwwkzkvrfkgc42ajw7r3ns4yynz75athqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk7vjmme" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxn7t97ad7wuqpws05j6k99kuwy4e254fqlnrg7k93vjpmr93732q0k9uy5&#39;&gt;nevent1q…9uy5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;You&amp;#39;re right in theory, but not how things work in practice. The large majority of apps send tracking data to Google exclusively directly through their tracking library. They don&amp;#39;t send tracking data to their own servers so they couldn&amp;#39;t silently forward it. A future version could send tracking data to their server, just as a future version could serve ads through their server. Thus, with every new version you&amp;#39;d need to verify again what they send where.
    </content>
    <updated>2025-01-27T14:37:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqjc0ldzmdn6vya8rd4ezdm3xc30lunv5fay3c6y86jezaugek52gzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkwzvshw</id>
    
      <title type="html">And in case that wasn&amp;#39;t obvious, this isn&amp;#39;t meant as an ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqjc0ldzmdn6vya8rd4ezdm3xc30lunv5fay3c6y86jezaugek52gzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkwzvshw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg4jzrcn3jq74asvvryce0q4apej8xvstnqd4s35sutkpzrnucavc8fredh&#39;&gt;nevent1q…redh&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;And in case that wasn&amp;#39;t obvious, this isn&amp;#39;t meant as an attack towards GrapheneOS. You do amazing work and your results are astonishing. But that shouldn&amp;#39;t keep you from realizing that the work of others, even if only opportunistic, also improves people&amp;#39;s life in the wild.&lt;br/&gt;&lt;br/&gt;Greetings from a user of a custom-built GrapheneOS modified to support microG in regular user sandbox.
    </content>
    <updated>2025-01-27T14:27:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg4jzrcn3jq74asvvryce0q4apej8xvstnqd4s35sutkpzrnucavczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkfzz757</id>
    
      <title type="html">If ad blockers work reasonably well in practice, it is likely ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg4jzrcn3jq74asvvryce0q4apej8xvstnqd4s35sutkpzrnucavczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkfzz757" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfz0ua0zpuargpytldyqqarvhfj57j6y84d0we7s9edy6dpuetdfsldgrkg&#39;&gt;nevent1q…grkg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If ad blockers work reasonably well in practice, it is likely that privacy blockers do so as well. They&amp;#39;re not perfect, they will let some data slip through, so any absolute approach is to be preferred when available and applicable. But they likely are a good addition to provide opportunistic improvements for what absolute approaches can&amp;#39;t do (yet).&lt;br/&gt;Opportunistic improvements are still better than no improvements.
    </content>
    <updated>2025-01-27T14:23:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfz0ua0zpuargpytldyqqarvhfj57j6y84d0we7s9edy6dpuetdfszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkd546rc</id>
    
      <title type="html">Please realize how I was talking about ad blocking and ad ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfz0ua0zpuargpytldyqqarvhfj57j6y84d0we7s9edy6dpuetdfszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkd546rc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrvvf9c4guwxygp7ke8zpdlcfjfr5vemhxc7745yj8u5awu93hc6surv7fg&#39;&gt;nevent1q…v7fg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Please realize how I was talking about ad blocking and ad blocking only here, not that some ad blocker lists also include tracking blocking.&lt;br/&gt;&lt;br/&gt;I use the ad blocker example because it&amp;#39;s a perfect analogy that is much easier to grasp. The effect of privacy blocking is almost impossible to quantify, because you don&amp;#39;t know how much less data about you is collected due to using them. With ad blockers you can easily see yourself how effective they are.
    </content>
    <updated>2025-01-27T14:19:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8y3g8dt05myslvk9tsgn4973zlzpe0gudhl4hkdntplndlmk2shszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkxl3sn9</id>
    
      <title type="html">I know all this. But again: In practice ad blockers work ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8y3g8dt05myslvk9tsgn4973zlzpe0gudhl4hkdntplndlmk2shszyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkxl3sn9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdk8vk5tfkp5pgseja3x2r8r9369946q7w7dgd0u6hm530w3l4ptq84vkat&#39;&gt;nevent1q…vkat&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I know all this. But again: In practice ad blockers work reasonably well. Yes, some ads manage to pass through, but most get blocked. It effectively improves the user&amp;#39;s experience.&lt;br/&gt;&lt;br/&gt;The absolute stance would be to say that either you have to accept the websites render ton of ads, because there is no guaranteed way of blocking them, or you stop using the web. But some people prefer the non-absolutist way, that is to use an ad blocker.
    </content>
    <updated>2025-01-27T14:04:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfl7thkdxmvykhxzu2uaske7urvenhhm2xe7few7a7t4xnej5j7cqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkraw7ea</id>
    
      <title type="html">I&amp;#39;m not saying that FOSS has better privacy just because ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfl7thkdxmvykhxzu2uaske7urvenhhm2xe7few7a7t4xnej5j7cqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkraw7ea" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8d9my9sy3uenzedqd5dergx6m68uufftp35erydwwyqvzz09t2pcn9fmmp&#39;&gt;nevent1q…fmmp&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I&amp;#39;m not saying that FOSS has better privacy just because it&amp;#39;s FOSS, but also we know that in practice, this is the case. The average FOSS app is more privacy friendly. If you install 10 random apps from F-Droid, you&amp;#39;re likely to end up with 10 somewhat privacy-friendly apps (especially if you have the filter for anti-features enabled). If you install 10 random apps from Play Store, about half of them probably perform tracking that is illegal in the EU.
    </content>
    <updated>2025-01-27T13:51:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8795rttgaansjqt4xqf98x472eefkg2779v8agqvp0kj3lh0a32czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkxkd7yt</id>
    
      <title type="html">&amp;gt; Privacy/security features need to hold up to an adversary ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8795rttgaansjqt4xqf98x472eefkg2779v8agqvp0kj3lh0a32czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkxkd7yt" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspjh8rwvvm9tdmzrgp7202r4mv3z2u908048etkdsk8kzk82j76fqcexrd0&#39;&gt;nevent1q…xrd0&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&amp;gt; Privacy/security features need to hold up to an adversary aware of it and which can actively adapt to it in order to be a serious approach.&lt;br/&gt;&lt;br/&gt;See, this is what I mean. I totally agree with you on the one hand, but on the other hand, I understand people consider, for example, an ad blocker a useful tool, because it works reasonably well in practice even if technically, it can be bypassed easily.
    </content>
    <updated>2025-01-27T13:44:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvdvvt3cefjnh0zds72dz39emakejvr70wmqjlq340c4v5l6xstxqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkcqegax</id>
    
      <title type="html">Auf der anderen Seite ist es deutlich differenzierter: Bei FOSS ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvdvvt3cefjnh0zds72dz39emakejvr70wmqjlq340c4v5l6xstxqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkcqegax" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs28znqkmlgnwf0e64g00e2ndj47202llqu5t2zvrvgufav6gsus2g5cnrky&#39;&gt;nevent1q…nrky&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Auf der anderen Seite ist es deutlich differenzierter: Bei FOSS Apps guckt man einfach was sie machen und die Berechtigungen sind quasi nebensächlich, bei proprietären Apps gilt zwar die Annahme, dass sie womöglich die Daten &amp;#34;falsch&amp;#34; verwenden, aber ein Nachweis dazu macht es eben doch noch schlimmer. Dazu kommt, dass man einem kleinen, lokalen Unternehmen anders Daten zugesteht als etwa Apple oder Google (wo Missbrauch stärker vermutet wird).
    </content>
    <updated>2025-01-27T13:37:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs28znqkmlgnwf0e64g00e2ndj47202llqu5t2zvrvgufav6gsus2gzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk7wy2yl</id>
    
      <title type="html">Ich denke der Hintergrund ist ein grundsätzlich ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs28znqkmlgnwf0e64g00e2ndj47202llqu5t2zvrvgufav6gsus2gzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk7wy2yl" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxc8uxhymqf40xr8rv3pvk4l54cjza7djl2tdtgzpvpax84h050cs4qs2ql&#39;&gt;nevent1q…s2ql&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Ich denke der Hintergrund ist ein grundsätzlich unterschiedliches Verständnis von Datenschutz in verschiedenen Bubbles der Privacy-Community.&lt;br/&gt;&lt;br/&gt;Auf der einen Seite ist es mehr absolut: Was eine App kann, das müssen wir auch annehmen, dass sie das auch tut. Ob es faktisch Tracking gibt oder nicht, ist dabei fast egal, genauso wer die Daten bekommt (weil er ja weitergeben könnte). Der einzige wirksame Schutz ist, die zugreifbaren Daten zu reduzieren.
    </content>
    <updated>2025-01-27T13:35:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqpadv7z9uluw85zsfyyyu54k9hgew8w662xcqp7x7kptxarvrfwqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkx5uy4a</id>
    
      <title type="html">I mean, I totally understand why @npub1m9z…whzq did this, as ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqpadv7z9uluw85zsfyyyu54k9hgew8w662xcqp7x7kptxarvrfwqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkx5uy4a" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdtkqex0438fq6eacrd4vqcvdeyyaj50k7rej6yxksx4cgze2yzncg94atm&#39;&gt;nevent1q…4atm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I mean, I totally understand why &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1m9z3pdhlx9sv2nwheajue25x7cukavasfpyczlzt2k0aaqxj909q2wwhzq&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;The Matrix.org Foundation&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1m9z…whzq&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; did this, as they somehow have to manage with limited amount of money and this probably saves them a bunch.&lt;br/&gt;&lt;br/&gt;But to me they still broke their social contract: (at least some of the) people that have signed up for an account on matrix.org expected to use a free software server. Now they and their data have been forcefully migrated to proprietary software.
    </content>
    <updated>2025-01-19T09:13:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdtkqex0438fq6eacrd4vqcvdeyyaj50k7rej6yxksx4cgze2yznczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkka4rxz</id>
    
      <title type="html">What strikes me most about this recent #Matrix announcement is ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdtkqex0438fq6eacrd4vqcvdeyyaj50k7rej6yxksx4cgze2yznczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkka4rxz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqghugrs43mskugjw0e5jjse9nfaaphc9xyvmflp5aavd9xgv8xsqzww7a9&#39;&gt;nevent1q…w7a9&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;What strikes me most about this recent #Matrix announcement is not that they created a commercial version and that this version is more efficient, but rather that users of the matrix.org home server are now using a proprietary server software.&lt;br/&gt;If I now go on the main website of &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1m9z3pdhlx9sv2nwheajue25x7cukavasfpyczlzt2k0aaqxj909q2wwhzq&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;The Matrix.org Foundation&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1m9z…whzq&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;, where they repeatedly mention how they&amp;#39;re open-source, and follow the guide to create an account, I will end up with an account on a proprietary server running in a proprietary cloud environment.
    </content>
    <updated>2025-01-19T09:09:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqyzg3ezc0x3vsm0a5u05mvskgzcpfrl3mu78n9nsgm3lr8y8elhqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkz0cht7</id>
    
      <title type="html">Das Niveau auf dem wir uns hier bewegen ist nicht weit entfernt ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqyzg3ezc0x3vsm0a5u05mvskgzcpfrl3mu78n9nsgm3lr8y8elhqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkz0cht7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsv0lh0gz4370vya8vdcm55xd9uxxn0scxsv7uxtrcq0d4vd55lqhqwdhv3e&#39;&gt;nevent1q…hv3e&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Das Niveau auf dem wir uns hier bewegen ist nicht weit entfernt von:&lt;br/&gt;&amp;#34;Kritische Sicherheitslücke in F-Droid: Wer einen Browser aus F-Droid installiert und dann damit auf eine Webseite geht, führt potentiell Schadcode (JavaScript) aus&amp;#34;
    </content>
    <updated>2025-01-06T14:45:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv0lh0gz4370vya8vdcm55xd9uxxn0scxsv7uxtrcq0d4vd55lqhqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk03zhsa</id>
    
      <title type="html">Das gleiche gilt für alle anderen binaries die im Quellcode so ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv0lh0gz4370vya8vdcm55xd9uxxn0scxsv7uxtrcq0d4vd55lqhqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk03zhsa" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswrje0rwxdrf548xyuvgqeyfyg4nj4zxsr8y97ard6rc4daumw48g6dt0tr&#39;&gt;nevent1q…t0tr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Das gleiche gilt für alle anderen binaries die im Quellcode so rumfliegen, ich kann dir auch Schadcode in eine .png packen. Der Code der code aus Binärdateien oder Drittquellen ausliest und dynamisch zur Ausführung bringt ist IMO bereits Schadcode und sollte nie in F-Droid landen. Die Signaturblöcke sind zwar hier ein zusätzlicher Weg, aber eben bei weitem nicht der einzige um Schadcode auszuliefern, wenn Code dynamisch geladen wird.
    </content>
    <updated>2025-01-06T14:37:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0zl20lzxf5nvmxwxj5tl2kgtdadgf3s0dgpc5gzr630ug2ljjavgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkjlntl7</id>
    
      <title type="html">Ja, aber kaputte Signatur-Blöcke haben halt keine Auswirkungen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0zl20lzxf5nvmxwxj5tl2kgtdadgf3s0dgpc5gzr630ug2ljjavgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkjlntl7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9j9rjf0h95fwekw9q9ds3c8qwpf7l2l086erdfqjxdzdp5czulwcmf3rp6&#39;&gt;nevent1q…3rp6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Ja, aber kaputte Signatur-Blöcke haben halt keine Auswirkungen auf den ausgeführten Programmcode der Apps, wenn diese nicht im Quellcode schon Schadcode haben, der dynamisch Schadcode nachlädt. Die Signaturblöcke werden ja nicht einfach ausgeführt. Deswegen ist der maximale Impact hier eben, dass die App mit kaputten Signaturblöcken im Repository landet und deswegen Updates nicht mehr funktionieren.
    </content>
    <updated>2025-01-06T14:31:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstp67grusuavwq46k2d8whhm0hm457pu792u6h9pd5rst4jme2dmgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkvthz8k</id>
    
      <title type="html">Nein, das wird da genauso dargestellt. Das ursprüngliche Problem ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstp67grusuavwq46k2d8whhm0hm457pu792u6h9pd5rst4jme2dmgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkvthz8k" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspsk8kkdenare883pd6y9ugrpxneyfn6294fyeu8l5cqznhhp5vtsx2e2k6&#39;&gt;nevent1q…e2k6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Nein, das wird da genauso dargestellt. Das ursprüngliche Problem wurde durch Änderungen, die die F-Droid-Entwickler selbst gemacht haben behoben, die patches des Entdeckers der Lücke wurden nicht genutzt. Bei den Änderungen von F-Droid selbst gab es bekannte Probleme, die aber keine Sicherheitslücken darstellten. Eine Sicherheitslücke darin wurde erst mit Datum 2024-12-30 gefunden und direkt veröffentlicht. Der Finder selbst sieht den impact aber &amp;#34;lower&amp;#34;.
    </content>
    <updated>2025-01-06T14:11:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8qs594nrs8053ek06r0zvhm7wqdpa3l58jgd634lzejcz3s6ujaczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakklrgynk</id>
    
      <title type="html">Interessant auch, dass keiner in der Community bemängelt, dass ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8qs594nrs8053ek06r0zvhm7wqdpa3l58jgd634lzejcz3s6ujaczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakklrgynk" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf2pg7k948lnn7n9khxpfr4hcl00mzrlftrnqcu542kdkgwq0xx4s6tapuh&#39;&gt;nevent1q…apuh&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Interessant auch, dass keiner in der Community bemängelt, dass hier kein responsible disclosure zum Einsatz kam. Klar, muss man nicht, aber dann ist die Beschwerde, dass eine Lücke mit effektiv geringem Impact nicht in 7 Tagen über Neujahr gefixt wurde doch schon etwas abgehoben.
    </content>
    <updated>2025-01-06T13:44:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp2w8ceptf2vuz4wh7dvrhupvcqy86q09zx7jgenj5sl6xdkgek0czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk7dzl7y</id>
    
      <title type="html">Das stimmt, ich hab ja auch &amp;#34;Updates&amp;#34; gesagt :) Wichtig ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp2w8ceptf2vuz4wh7dvrhupvcqy86q09zx7jgenj5sl6xdkgek0czyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk7dzl7y" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9y45ua9eyk6fp76h4gnpfwjlrgsjvxnq52hmc93ezw30tpkxljtq7q2mmd&#39;&gt;nevent1q…2mmd&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Das stimmt, ich hab ja auch &amp;#34;Updates&amp;#34; gesagt :) Wichtig ist und bleibt aber, dass nur der Original-Quellcode im F-Droid repository landet.
    </content>
    <updated>2025-01-06T13:37:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf2pg7k948lnn7n9khxpfr4hcl00mzrlftrnqcu542kdkgwq0xx4szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkumqx0d</id>
    
      <title type="html">du meinst seit ein Paar Tagen mit &amp;#34;lange&amp;#34;? Die ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf2pg7k948lnn7n9khxpfr4hcl00mzrlftrnqcu542kdkgwq0xx4szyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkumqx0d" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswj2puyak9cq4hd57f7yfvxu29vfth7tywzcpec0hc7jj3tukx7usfl6c0d&#39;&gt;nevent1q…6c0d&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;du meinst seit ein Paar Tagen mit &amp;#34;lange&amp;#34;? Die ursprüngliche Lücke die letzten April gefunden wurde, wurde bereits letzten Mai geschlossen, es wurde nur vor ein Paar Tagen eine neue Lücke an ähnlicher Stelle im gleichen repository als &amp;#34;Update&amp;#34; veröffentlicht.
    </content>
    <updated>2025-01-06T13:29:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstnutheaz738yyk8yz5uktp8a9552clfsfx0dy7v5pc6jcvytpe0qzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkewzsfd</id>
    
      <title type="html">Wie gesagt, für diesen Angriff müsste der Schadcode, der den ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstnutheaz738yyk8yz5uktp8a9552clfsfx0dy7v5pc6jcvytpe0qzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkewzsfd" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsws8ehadzy5nc9h3t6aslu7ylj7lns9rx85l9hfxfzup0jkg3945qa90scc&#39;&gt;nevent1q…0scc&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Wie gesagt, für diesen Angriff müsste der Schadcode, der den Schadcode aus der Signatur nachlädt, bereits im Open-Source code der App sein. Wenn wir bereits Schadcode im Open-Source code der App annehmen, kann durch diese Lücke auch kein zusätzlicher Schaden entstehen.&lt;br/&gt;&lt;br/&gt;Ich will nicht sagen, dass man diese Lücke nicht schließen sollte. Es ist aber ein Klassiker in der Community, bei einem sehr komplexen Thema wie diesem einfach ohne Verstand drauf zu hauen...
    </content>
    <updated>2025-01-06T13:15:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyttsyhky3lp62slju7jscj809l8tsedcnqk0pxkf3d9lehhxscfgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkgdwdgy</id>
    
      <title type="html">Theoretisch könnte man sich auch noch ein Szenario ausdenken, wo ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyttsyhky3lp62slju7jscj809l8tsedcnqk0pxkf3d9lehhxscfgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkgdwdgy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqjn6dtx9900arwvh6pzcsu2wcg63lwgst04s5hhlw02mgqj9z4jggv5q2j&#39;&gt;nevent1q…5q2j&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Theoretisch könnte man sich auch noch ein Szenario ausdenken, wo der Publisher einer App in der kaputten Signatur Schadcode einbettet und in dem reproduzierbar gebauten open source code seiner app Logik hat, die den Schadcode aus der Signatur sucht und ausführt. Da gibt es aber verschiedene Gründe die diesen &amp;#34;Angriff&amp;#34; nahezu unmöglich machen (Länge der Signatur, Einschränkungen in Android welcher Code ausführbar ist, usw.)
    </content>
    <updated>2025-01-06T12:48:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqjn6dtx9900arwvh6pzcsu2wcg63lwgst04s5hhlw02mgqj9z4jgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk63m6pm</id>
    
      <title type="html">Das führt im schlimmsten Fall dazu, dass der Publisher einer App ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqjn6dtx9900arwvh6pzcsu2wcg63lwgst04s5hhlw02mgqj9z4jgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk63m6pm" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsweah0sl9xnzzuxz2lyj45j33mvah0aa9zg2p9wn5m5tvfvpmhljq3m0g8p&#39;&gt;nevent1q…0g8p&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Das führt im schlimmsten Fall dazu, dass der Publisher einer App (der erst eine entsprechend präparierte .apk mit kaputter Signatur veröffentlichen muss) damit erreichen kann, dass Updates seiner eigenen App im F-Droid kaputte Signaturen haben und diese durch den Nutzer nicht mehr installierbar sind.&lt;br/&gt;&lt;br/&gt;Und ich bin mir nicht mal sicher, ob dieser Angriff überhaupt möglich ist, gegeben wie der Buildserver die Signatur kopiert.
    </content>
    <updated>2025-01-06T12:44:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsweah0sl9xnzzuxz2lyj45j33mvah0aa9zg2p9wn5m5tvfvpmhljqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk5zs0mn</id>
    
      <title type="html">Der schlimmstmögliche Angriff auf dem offiziellen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsweah0sl9xnzzuxz2lyj45j33mvah0aa9zg2p9wn5m5tvfvpmhljqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakk5zs0mn" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspsqws8l405qk3v6qsv50dqzlv848t23mj6wg3les90sjr7yqdxsg8qytnl&#39;&gt;nevent1q…ytnl&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Der schlimmstmögliche Angriff auf dem offiziellen F-Droid-Repository ist also nicht, wie von &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1g6jqsae3maecf4vsseusdd2khzcl0z5tvnluwl5amjhd96k2gz8qrs4s5g&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kuketz-Blog 🛡&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1g6j…4s5g&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;  behauptet, dass eine &amp;#34;manipulierte oder unsichere&amp;#34; .apk im offiziellen F-Droid repository landet, sondern nur, dass eine kaputte oder falsche Signatur an die reproduzierbar gebaute .apk angehängt wird.
    </content>
    <updated>2025-01-06T12:41:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspsqws8l405qk3v6qsv50dqzlv848t23mj6wg3les90sjr7yqdxsgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkt7g5xu</id>
    
      <title type="html">Das offizielle F-Droid repository benutzt diese Funktion auch in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspsqws8l405qk3v6qsv50dqzlv848t23mj6wg3les90sjr7yqdxsgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkt7g5xu" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsy34pnj843cydmlgdtl8wn63nc36nk3hsvp0ygdtau3qlxaa6wckqjmv2f3&#39;&gt;nevent1q…v2f3&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Das offizielle F-Droid repository benutzt diese Funktion auch in ihren Metadaten um bei reproduzierbar gebauten .apk die Signatur des ursprünglichen Entwicklers zu erzwingen. Allerdings werden wie bereits erwähnt, alle .apk die im F-Droid repository sind, auf dem Server von F-Droid gebaut und dann entweder eine eigene Signatur, oder im Falle reproduzierbaren .apk die Signatur der Original-App angehängt.
    </content>
    <updated>2025-01-06T12:38:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy34pnj843cydmlgdtl8wn63nc36nk3hsvp0ygdtau3qlxaa6wckqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkswy2x7</id>
    
      <title type="html">In den Metadaten zu einem F-Droid-Repository kann ein ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy34pnj843cydmlgdtl8wn63nc36nk3hsvp0ygdtau3qlxaa6wckqzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkswy2x7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2se344uqvhzkpqsrkhe5ruz8nzs8ytefqq7qf9ljxk46pck5ax5c6dcne2&#39;&gt;nevent1q…cne2&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;In den Metadaten zu einem F-Droid-Repository kann ein öffentlicher Schlüssel hinterlegt werden, sodass auf dem Server nur noch .apk für eine bestimmte App akzeptiert werden, die mit diesem Schlüssel signiert sind.&lt;br/&gt;&lt;br/&gt;Diese Signaturprüfung hat aktuell Fehler, die unter Umständen dazu führen könnte, dass in einem F-Droid repository .apk mit Signaturen sind, die dort laut Metadaten nicht sein dürfen.
    </content>
    <updated>2025-01-06T12:34:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfqw4c9kcn6za2j9653lxs3ypdg8acrg45j6ddcz6xe05pzv2mepgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkmr5xp0</id>
    
      <title type="html">That&amp;#39;s not how this works. @npub1le8…4nlt is registered as ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfqw4c9kcn6za2j9653lxs3ypdg8acrg45j6ddcz6xe05pzv2mepgzyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkmr5xp0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf4g07yw86r2rkuhwcqytt6wh4h3p8gu7zrss07srm6q8wgqpgtzszxylm4&#39;&gt;nevent1q…ylm4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;That&amp;#39;s not how this works. &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1le8asupx3tr87j3fwv0nyxx92l5vqquwa3r4hcvcs3pfxeasm94qge4nlt&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kiwix&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1le8…4nlt&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; is registered as a Swiss company and thus is not a data subject in the sense of the GDPR (only natural persons can be data subjects).
    </content>
    <updated>2024-12-10T14:17:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9ees0jkwlchq68me8x2tjwfh6x9yn8dxjn9fpkckk59667wzwwzczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkrndmkp</id>
    
      <title type="html">When you use Signal on iOS or Google Android, it will register ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9ees0jkwlchq68me8x2tjwfh6x9yn8dxjn9fpkckk59667wzwwzczyp0xm3vxkl3r8zm6hj2ls4pwxvqxrcx2knaa4hxwr04h7z0heeakkrndmkp" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsq3uwn0j4ennyquy74d0jenlxq5pfhymrt6836kqr6q43pu2sf72gn38g7w&#39;&gt;nevent1q…8g7w&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;When you use Signal on iOS or Google Android, it will register for the OS push notification system and link your burner phone number with all the other apps/accounts you have on the same phone that use push notifications, including the Apple and Google accounts that you likely have on the same phone. So you&amp;#39;d also need to use a burner phone, that you use exclusively for Signal (or an OS that doesn&amp;#39;t have a push notification system like &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1kwarc5z9lwhen05uknd2nuwhhthd4ws0cku3t9j3rchm0fcd6luslse0nj&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;GrapheneOS&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1kwa…e0nj&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; and take extra caution)
    </content>
    <updated>2024-08-01T07:25:59Z</updated>
  </entry>

</feed>