diff --git a/static/faq.html b/static/faq.html index 069a5c1f..795f285a 100644 --- a/static/faq.html +++ b/static/faq.html @@ -354,13 +354,30 @@ The Weaver token is stored alongside a Weaver key derived by the OS from the password token. In order to retrieve the Weaver token, the secure element requires the correct Weaver key. A secure internal timer is used to implement - hardware-based exponentially increasing delays for each attempt at key - derivation and quickly ramps up to 1 day per attempt. Weaver also provides - reliable wiping of data since the secure element can reliably wipe a Weaver - slot. Deleting a profile will wipe the corresponding Weaver slot and a factory - reset of the device wipes all of the Weaver slots. The secure element also - provides insider attack resistance preventing firmware updates before - authenticating with the owner profile.

+ hardware-based delays for each attempt at key derivation. It quickly ramps up + to 1 day delays before the next attempt. Weaver also provides reliable wiping + of data since the secure element can reliably wipe a Weaver slot. Deleting a + profile will wipe the corresponding Weaver slot and a factory reset of the + device wipes all of the Weaver slots. The secure element also provides insider + attack resistance preventing firmware updates before authenticating with the + owner profile.

+ +

Standard delays for encryption key derivation enforced by the secure + element:

+ +

GrapheneOS only officially supports devices with Weaver. The fallback implementation for devices without it is out-of-scope for this FAQ.