use conforming procedure style in faq.html

This commit is contained in:
sandbank52641 2024-02-04 12:36:42 +01:00 committed by Daniel Micay
parent b884d0b058
commit 2d38a0b071

View File

@ -635,7 +635,9 @@
<p>As of Android 12, the user is notified when an app reads clipboard content <p>As of Android 12, the user is notified when an app reads clipboard content
which was set by a different app. This notice is enabled by default and can be which was set by a different app. This notice is enabled by default and can be
toggled under Settings ➔ Privacy ➔ Show clipboard access.</p> toggled under <b>Settings&#160;<span aria-label="and then">></span>
Privacy&#160;<span aria-label="and then">></span> Show clipboard
access</b>.</p>
</article> </article>
<article id="hardware-identifiers"> <article id="hardware-identifiers">
@ -884,13 +886,15 @@
<p>We plan to offer a toggle to use the standard functionality instead of <p>We plan to offer a toggle to use the standard functionality instead of
HTTPS-based time updates in order to blend in with other devices.</p> HTTPS-based time updates in order to blend in with other devices.</p>
<p>Network time can be disabled with the toggle at Settings ➔ System ➔ Date <p>Network time can be disabled with the toggle at
&amp; time ➔ Set time automatically. Unlike AOSP or the stock OS on the <b>Settings&#160;<span aria-label="and then">></span>
supported devices, GrapheneOS stops making network time connections when using System&#160;<span aria-label="and then">></span> Date &amp;
network time is disabled rather than just not setting the clock based on it. time&#160;<span aria-label="and then">></span> Set time automatically</b>.
The time zone is still obtained directly via the time zone provided by the Unlike AOSP or the stock OS on the supported devices, GrapheneOS stops making
mobile network (NITZ) when available which you can also disable by the "Set network time connections when using network time is disabled rather than just
time zone automatically" toggle.</p> not setting the clock based on it. The time zone is still obtained directly
via the time zone provided by the mobile network (NITZ) when available which
you can also disable by the <b>Set time zone automatically</b> toggle.</p>
</li> </li>
<li> <li>
<p>Connectivity checks designed to mimic a web browser user agent are performed <p>Connectivity checks designed to mimic a web browser user agent are performed
@ -915,14 +919,15 @@
right underlying network for a VPN and to handle many types of captive right underlying network for a VPN and to handle many types of captive
portals without the user turning off their VPN.</p> portals without the user turning off their VPN.</p>
<p>You can change the connectivity check URLs via the Settings ➔ <p>You can change the connectivity check URLs via the
Network &amp; Internet ➔ Internet connectivity check setting. <b>Settings&#160;<span aria-label="and then">></span> Network &amp;
At the moment, it can be toggled between the GrapheneOS servers internet&#160;<span aria-label="and then">></span> Internet
(default), the standard Google servers used by billions of other connectivity check</b> setting. At the moment, it can be toggled between
Android devices or disabled.</p> the <b>GrapheneOS server</b> (default), the <b>Standard (Google) server</b>
used by billions of other Android devices or <b>Off</b>.</p>
<p>By default, the GrapheneOS connectivity check servers are used via the <p>By default, the <b>GrapheneOS server</b> is used via the following
following URLs:</p> URLs:</p>
<ul> <ul>
<li>HTTPS: https://connectivitycheck.grapheneos.network/generate_204</li> <li>HTTPS: https://connectivitycheck.grapheneos.network/generate_204</li>
@ -931,10 +936,10 @@
<li>HTTP other fallback: http://grapheneos.online/generate_204</li> <li>HTTP other fallback: http://grapheneos.online/generate_204</li>
</ul> </ul>
<p>Changing this to the Standard (Google) mode will use the same URLs <p>Changing this to <b>Standard (Google) server</b> will use the same
used by AOSP and the stock OS along with the vast majority of other URLs used by AOSP and the stock OS along with the vast majority of
devices, blending in with billions of other Android devices both with other devices, blending in with billions of other Android devices both
and without Play services:</p> with and without Play services:</p>
<ul> <ul>
<li>HTTPS: https://www.google.com/generate_204</li> <li>HTTPS: https://www.google.com/generate_204</li>
@ -943,11 +948,11 @@
<li>HTTP other fallback: http://play.googleapis.com/generate_204</li> <li>HTTP other fallback: http://play.googleapis.com/generate_204</li>
</ul> </ul>
<p>GrapheneOS also adds the ability to fully disable the connectivity <p>GrapheneOS also adds the ability to fully turn <b>Off</b> the
checks. This results in the OS no longer handling captive portals connectivity checks. This results in the OS no longer handling captive
itself, not falling back to other networks when some don't have portals itself, not falling back to other networks when some don't
internet access and not being able to delay scheduled jobs depending have internet access and not being able to delay scheduled jobs
on internet access until it becomes available.</p> depending on internet access until it becomes available.</p>
</li> </li>
<li> <li>
<p>HTTPS connections are made to fetch <p>HTTPS connections are made to fetch
@ -1028,9 +1033,11 @@
reverse proxy adds to that since it's unable to decrypt the reverse proxy adds to that since it's unable to decrypt the
provisioned keys</p> provisioned keys</p>
<p>A setting is added at Settings ➔ Network &amp; Internet ➔ <p>A setting is added at <b>Settings&#160;<span aria-label="and
Attestation key provisioning server for switching to directly using then">></span> Network &amp; internet&#160;<span
the Google service if you prefer.</p> aria-label="and then">></span> Attestation key
provisioning</b> for switching to directly using the Google service if
you prefer.</p>
<p>A future device built to run GrapheneOS as the stock OS would be <p>A future device built to run GrapheneOS as the stock OS would be
able to have a GrapheneOS attestation root and GrapheneOS attestation able to have a GrapheneOS attestation root and GrapheneOS attestation
@ -1114,30 +1121,31 @@
normally, you can remove the <code>dun</code> APN type from your APN normally, you can remove the <code>dun</code> APN type from your APN
configuration.</p> configuration.</p>
<p>When you have both a cellular connection and Location enabled, control plane <p>When you have both a cellular connection and Location enabled, control
and/or user plane (SUPL) A-GNSS is used in addition to PSDS to greatly reduce plane and/or user plane (SUPL) A-GNSS is used in addition to PSDS to greatly
the time needed for GNSS to obtain an initial location lock. These obtain reduce the time needed for GNSS to obtain an initial location lock. These
coarse location info from a server based on nearby cell towers. Control plane obtain coarse location info from a server based on nearby cell towers. Control
A-GNSS is provided by the cellular connection itself and therefore doesn't plane A-GNSS is provided by the cellular connection itself and therefore
have any real privacy implications while SUPL connects to a server often not doesn't have any real privacy implications while SUPL connects to a server
provided by the carrier. Most A-GNSS services only accelerate obtaining a satellite-based often not provided by the carrier. Most A-GNSS services only accelerate
location and won't provide an estimate on their own. The carrier can choose a obtaining a satellite-based location and won't provide an estimate on their
SUPL server as part of their carrier configuration but most leave it at the own. The carrier can choose a SUPL server as part of their carrier
default of supl.google.com. By default, GrapheneOS overrides the configuration but most leave it at the default of supl.google.com. By default,
carrier/fallback SUPL server and uses the supl.grapheneos.org proxy. GrapheneOS adds a GrapheneOS overrides the carrier/fallback SUPL server and uses the
toggle for configuring SUPL in Settings ➔ Location where you can choose supl.grapheneos.org proxy. GrapheneOS adds a toggle for configuring SUPL in
between the default supl.grapheneos.org proxy, the standard server <b>Settings&#160;<span aria-label="and then">></span> Location</b> where you
(carrier/fallback) or disabling it completely. GrapheneOS also disables can choose between the default <b>GrapheneOS proxy</b> supl.grapheneos.org,
sending IMSI and phone number as part of SUPL. Pixels with a Qualcomm baseband the <b>Standard server</b> (carrier/fallback) or turning it <b>Off</b>
use it to provide both cellular and GNSS including both control plane and user completely. GrapheneOS also disables sending IMSI and phone number as part of
plane A-GNSS being implemented inside the baseband. For Qualcomm baseband SUPL. Pixels with a Qualcomm baseband use it to provide both cellular and GNSS
devices, SUPL is only enabled if the APN configuration for the carrier including both control plane and user plane A-GNSS being implemented inside
includes <code>supl</code> as an APN type. Pixels with a Samsung baseband have the baseband. For Qualcomm baseband devices, SUPL is only enabled if the APN
a separate Broadcom GNSS chip without integration between them so SUPL is done configuration for the carrier includes <code>supl</code> as an APN type.
by the OS with regular networking (can use Wi-Fi and VPN) and SUPL is used Pixels with a Samsung baseband have a separate Broadcom GNSS chip without
regardless of the carrier's APN type configuration. GrapheneOS upgrades the integration between them so SUPL is done by the OS with regular networking
Broadcom SUPL implementation to only using TLSv1.2 instead of using TLSv1.1 (can use Wi-Fi and VPN) and SUPL is used regardless of the carrier's APN type
and older with TLSv1.2 disabled.</p> configuration. GrapheneOS upgrades the Broadcom SUPL implementation to only
using TLSv1.2 instead of using TLSv1.1 and older with TLSv1.2 disabled.</p>
<p>MMS, RCS, SMS over LTE, VVM (Visual Voicemail), VoLTE (carrier-based calls <p>MMS, RCS, SMS over LTE, VVM (Visual Voicemail), VoLTE (carrier-based calls
on 4G and higher), VoNR (5G) and VoWi-Fi are largely implemented by the OS via on 4G and higher), VoNR (5G) and VoWi-Fi are largely implemented by the OS via
@ -1229,14 +1237,16 @@
<article id="custom-dns"> <article id="custom-dns">
<h3><a href="#custom-dns">How do I use a custom DNS server?</a></h3> <h3><a href="#custom-dns">How do I use a custom DNS server?</a></h3>
<p>It isn't possible to directly override the DNS servers provided by the network via <p>It isn't possible to directly override the DNS servers provided by the
DHCP. Instead, use the Private DNS feature in Settings ➔ Network &amp; Internet ➔ network via DHCP. Instead, use the Private DNS feature in
Private DNS to set the hostname of a DNS-over-TLS server. It needs to have <b>Settings&#160;<span aria-label="and then">></span> Network &amp;
a valid certificate such as a free certificate from Let's Encrypt. The OS will look up internet&#160;<span aria-label="and then">></span> Private DNS</b> to set the
the Private DNS hostname via the network provided DNS servers and will then force all hostname of a DNS-over-TLS server. It needs to have a valid certificate such as a
other DNS requests through the Private DNS server. Unlike an option to override the free certificate from Let's Encrypt. The OS will look up the Private DNS hostname
network-provided DNS servers, this prevents the network from monitoring or tampering via the network provided DNS servers and will then force all other DNS requests
with DNS requests/responses.</p> through the Private DNS server. Unlike an option to override the network-provided
DNS servers, this prevents the network from monitoring or tampering with DNS
requests/responses.</p>
<p>As an example, set the hostname to <code>one.one.one.one</code> for Cloudflare DNS. <p>As an example, set the hostname to <code>one.one.one.one</code> for Cloudflare DNS.
There are various other mainstream DNS-over-TLS options available including Quad9, There are various other mainstream DNS-over-TLS options available including Quad9,
@ -1305,12 +1315,13 @@
<article id="vpn-support"> <article id="vpn-support">
<h3><a href="#vpn-support">What kind of VPN and Tor support is available?</a></h3> <h3><a href="#vpn-support">What kind of VPN and Tor support is available?</a></h3>
<p>VPNs can be configured under Settings ➔ Network &amp; Internet ➔ VPN. <p>VPNs can be configured under <b>Settings&#160;<span aria-label="and
Support for the following protocols is included: IKEv2/IPSec MSCHAPv2, then">></span> Network &amp; internet&#160;<span aria-label="and
IKEv2/IPSec PSK and IKEv2/IPSec RSA. Apps can also provide userspace VPN then">></span> VPN</b>. Support for the following protocols is
implementations and the following open source apps are recommended: WireGuard, included: IKEv2/IPSec MSCHAPv2, IKEv2/IPSec PSK and IKEv2/IPSec RSA. Apps can
RethinkDNS (WireGuard with local filtering options), Orbot (Tor) and OpenVPN also provide userspace VPN implementations and the following open source apps
for Android.</p> are recommended: WireGuard, RethinkDNS (WireGuard with local filtering
options), Orbot (Tor) and OpenVPN for Android.</p>
<p>VPN configurations created with the built-in support can be set as the <p>VPN configurations created with the built-in support can be set as the
always-on VPN in the configuration panel. This will keep the VPN running, always-on VPN in the configuration panel. This will keep the VPN running,
@ -1331,11 +1342,13 @@
<article id="network-monitoring"> <article id="network-monitoring">
<h3><a href="#network-monitoring">Can apps monitor network connections or statistics?</a></h3> <h3><a href="#network-monitoring">Can apps monitor network connections or statistics?</a></h3>
<p>Apps cannot monitor network connections unless they're made into the active VPN <p>Apps cannot monitor network connections unless they're made into the active
service by the user. Apps cannot normally access network stats and cannot directly VPN service by the user. Apps cannot normally access network stats and cannot
request access to them. However, app-based stats can be explicitly granted by users as directly request access to them. However, app-based stats can be explicitly
part of access to app usage stats in Settings ➔ Apps ➔ Special app access ➔ Usage granted by users as part of access to app usage stats in
access.</p> <b>Settings&#160;<span aria-label="and then">></span> Apps&#160;<span
aria-label="and then">></span> Special app access&#160;<span aria-label="and
then">></span> Usage access</b>.</p>
<p>This was previously part of the GrapheneOS privacy improvements, but became a <p>This was previously part of the GrapheneOS privacy improvements, but became a
standard Android feature with Android 10.</p> standard Android feature with Android 10.</p>
@ -1540,22 +1553,23 @@
<p>To use an external drive, plug it into the phone and use the system file <p>To use an external drive, plug it into the phone and use the system file
manager to copy files to and from it. The only difference on GrapheneOS is USB manager to copy files to and from it. The only difference on GrapheneOS is USB
peripherals such as USB flash drives will be ignored unless they're plugged in peripherals such as USB flash drives will be ignored unless they're plugged in
at boot or when the device is unlocked. You can configure this in Settings ➔ at boot or when the device is unlocked. You can configure this in
Security.</p> <b>Settings&#160;<span aria-label="and then">></span> Security&#160;<span
aria-label="and then">></span> USB peripherals</b>.</p>
<p>Transferring files to an attached computer is done with MTP / PTP. Users on <p>Transferring files to an attached computer is done with MTP / PTP. Users on
a Mac computer will need to install a Mac computer will need to install <a
<a href="https://www.android.com/filetransfer/">Android File Transfer</a> to be href="https://www.android.com/filetransfer/">Android File Transfer</a> to be
able to transfer files between macOS and Android. After plugging in the phone able to transfer files between macOS and Android. After plugging in the phone to
to the computer, there will be a notification showing the current USB mode with the computer, there will be a notification showing the current USB mode with
charging as the default. Pressing the notification acts as a shortcut to charging as the default. Pressing the notification acts as a shortcut to
Settings ➔ Connected devices ➔ USB. You can enable file transfer (MTP) or PTP <b>Settings&#160;<span aria-label="and then">></span> Connected devices&#160;<span
with this menu. It will provide read/write access to the entire profile home aria-label="and then">></span> USB</b>. You can enable <b>File Transfer</b> (MTP)
directory, i.e. the top-level directory named after the device in the system or <b>PTP</b> with this menu. It will provide read/write access to the entire profile home
file manager which does not include internal app data. Due to needing to trust directory, i.e. the top-level directory named after the device in the system file manager
the computer with coarse-grained access, we recommend transferring files with a which does not include internal app data. Due to needing to trust the computer with
flash drive or by sending the files to yourself via an end-to-end encrypted coarse-grained access, we recommend transferring files with a flash drive or by sending
messaging app like Element (Matrix).</p> the files to yourself via an end-to-end encrypted messaging app like Element (Matrix).</p>
</article> </article>
</section> </section>