diff --git a/static/features.html b/static/features.html index 19a70a92..eb20ff66 100644 --- a/static/features.html +++ b/static/features.html @@ -93,11 +93,12 @@ only 5 attempts rather than 20 before permanent lockout (our recommendation is still keeping sensitive data in user profiles without fingerprint unlock)
  • PIN scrambling option
  • -
  • LTE-only mode to reduce cellular radio attack surface by disabling enormous amounts of legacy +
  • LTE-only mode to reduce cellular radio attack surface by disabling enormous amounts of legacy code
  • -
  • Default enabled per-connection MAC randomization as an improvement over Android's default - per-network MAC randomization reusing the same MAC address until the DHCP lease with that - network expires (can still use the standard implementation or fully disable it)
  • +
  • Default enabled per-connection MAC randomization + as an improvement over Android's default per-network MAC randomization reusing + the same MAC address until the DHCP lease with that network expires (can still + use the standard implementation or fully disable it)
  • Vanadium: hardened WebView and default browser - the WebView is what most other apps use to handle web content, so you benefit from Vanadium in many apps even if you choose another browser
  • @@ -109,12 +110,15 @@ attestation.app service. See the detailed explanation on the site for more information. -
  • PDF Viewer: sandboxed, hardened PDF viewer using HiDPI rendering with pinch to zoom, text - selection, etc.
  • -
  • Encrypted backups via integration of the Seedvault app with support for local - backups and any cloud storage provider with a storage provider app
  • -
  • Secure application spawning system avoiding sharing address space layout and - other secrets across applications
  • +
  • PDF Viewer: sandboxed, + hardened PDF viewer using HiDPI rendering with pinch to zoom, text selection, + etc.
  • +
  • Encrypted backups via integration of the + Seedvault app with + support for local backups and any cloud storage provider with a storage provider + app
  • +
  • Secure application spawning system avoiding + sharing address space layout and other secrets across applications
  • Network permission toggle disallowing both direct and indirect network access, superior to a purely firewall-based implementation only disallowing direct access to the network without covering inter-process communication (enabled by @@ -129,10 +133,11 @@
  • Connectivity checks via a first party server with the option to revert to the standard checks
  • Hardened local build / signing infrastructure
  • -
  • Seamless automatic OS update system that just works and stays out of the way - in the background without disrupting device usage, with full support for the - standard automatic rollback if the first boot of the updated OS fails
  • -
  • Require unlocking to access sensitive function via quick tiles
  • +
  • Seamless automatic OS update system that just + works and stays out of the way in the background without disrupting device + usage, with full support for the standard automatic rollback if the first boot + of the updated OS fails
  • Require unlocking to access sensitive function + via quick tiles
  • Infrastructure features:

    @@ -172,7 +177,7 @@
  • Non-profit project avoiding conflicts of interest by keeping commercialization at a distance. Companies support the project rather than the project serving the needs of any particular company
  • -
  • Strong privacy policies
  • +
  • Strong privacy policies