diff --git a/static/faq.html b/static/faq.html index 131f9881..bf9030e8 100644 --- a/static/faq.html +++ b/static/faq.html @@ -113,7 +113,7 @@

Device support

-
+

Which devices are supported?

GrapheneOS has official production support for the Pixel 3, Pixel 3 XL, Pixel 3a, @@ -155,9 +155,9 @@ with easily added support for other environments. It can easily run on non-Linux-based operating systems too, and supporting some like HardenedBSD is planned but depends on contributors from those communities.

-
+ - + -
+

Which devices will be supported in the future?

Devices are carefully chosen based on their merits rather than the project aiming @@ -210,9 +210,9 @@ improve some aspects of insecure devices and supporting a broad set of devices would be directly counter to the values of the project. A lot of the low-level work also ends up being fairly tied to the hardware.

-
+ -
+

When will more devices be supported?

Broader device support can only happen after the community (companies, @@ -238,9 +238,9 @@ devices produced based on an SoC reference design with minor improvements for privacy and security. Broad device support is the opposite of what the project wants to achieve in the long term.

-
+ -
+

Why are older devices no longer supported?

GrapheneOS aims to provide reasonably private and secure devices. It cannot do that @@ -266,13 +266,13 @@ security of the project when exceptions for old devices need to be listed out. The project ends up wanting to drop devices for this reason but has always kept them going until the end-of-life date to provide more time for people to migrate.

-
+

Security and privacy

-
+

Can apps spy on the clipboard in the background or inject content into it?

As of Android 10, only the configured default input method editor (your keyboard of @@ -286,9 +286,9 @@ slightly less strict implementation of this feature. It provided a toggle for users to whitelist clipboard managers, which is no longer needed now that keyboards are expected to provide it.

-
+ -
+

Can apps access hardware identifiers?

As of Android 10, apps cannot obtain permission to access non-resettable hardware @@ -309,9 +309,9 @@ with limited functionality and hardware acceleration. Hiding the CPU/SoC model would require not even using basic hardware virtualization support and these things could probably still be detected via performance measurements.

-
+ -
+

What about non-hardware identifiers?

In addition to not having a way to identify the hardware, apps cannot directly @@ -373,9 +373,9 @@ However, profiles are the only way to provide a strong assurance of separate identities since the application model of the OS is designed to support communication between apps within the same profile, but never between them.

-
+ -
+

What does GrapheneOS do about cellular tracking, interception and silent SMS?

GrapheneOS always considers networks to be hostile and avoids placing trust in @@ -434,15 +434,15 @@ alerts for silent SMS but rather would be ignored with the rest of the spam. Regardless, sending texts or other data is not required or particularly useful to track devices connected to a network for an adversary with the appropriate access.

-
+ -
+
+ -
+

What kind of connections do the OS and bundled apps make by default?

GrapheneOS makes connections to the outside world to test connectivity, detect @@ -568,9 +568,9 @@ everything unnecessary and making our servers the default for handling anything that cannot simply be shipped with Vanadium for one reason or another such as requiring quicker updates.

-
+ -
+
+ -
+

Which DNS servers are used by default?

By default, the OS uses the network-provided DNS servers, whether those come from @@ -605,9 +605,9 @@ servers are provided, GrapheneOS uses Cloudflare DNS as the fallback rather than Google Public DNS. In practice, the fallback is rarely used and has little real world impact.

-
+ -
+

How do I use a custom DNS server?

It isn't possible to directly override the DNS servers provided by the network via @@ -636,9 +636,9 @@ part of fingerprinting users. If you're using a VPN, you should consider using the standard DNS service provided by the VPN service to avoid standing out from other users.

-
+ -
+

Why does Private DNS not accept IP addresses?

By default, in the automatic mode, the Private DNS feature provides opportunistic @@ -655,9 +655,9 @@ DNS server via unencrypted DNS and then force all other DNS lookups via DNS-over-TLS with the identity of the server authenticated as part of providing authenticated encryption.

-
+ -
+

Does DNS-over-TLS (Private DNS) protect other connections?

No, it only provides privacy for DNS resolution. Even authenticating DNS results @@ -669,9 +669,9 @@ There are other ways to perform a MITM attack than DNS hijacking and internet routing is fundamentally insecure. DNS-over-TLS may make a MITM harder for some attackers, but don't count on it at all.

-
+ -
+

Does DNS-over-TLS (Private DNS) hide which sites are visited, etc.?

Private DNS only encrypts DNS, and an adversary monitoring connections can still @@ -681,9 +681,9 @@ SNI, so encrypted DNS is not yet accomplishing much. It's a forward looking feature that will become more useful in the future. Using it is recommended, but it's not an alternative to using Tor or a VPN.

-
+ -
+

What kind of VPN and Tor support is available?

VPNs can be configured under Settings ➔ Network & Internet ➔ Advanced ➔ VPN. @@ -699,9 +699,9 @@ can also be set as the always-on VPN via the entry in the Settings page. For app-based VPN implementations, there's also an additional "Block connections without VPN" toggle which is needed to prevent leaks when the app's VPN service isn't running.

-
+ -
+

Can apps monitor network connections or statistics?

Apps cannot monitor network connections unless they're made into the active VPN @@ -712,9 +712,9 @@

This was previously part of the GrapheneOS privacy improvements, but became a standard Android feature with Android 10.

-
+ -
+

Does GrapheneOS provide a firewall?

Yes, GrapheneOS inherits the deeply integrated firewall from the Android Open @@ -729,9 +729,9 @@ ecosystem. Revoking the permission denies indirect access via OS components and apps enforcing the INTERNET permission, such as DownloadManager. Direct access is denied by blocking low-level network socket access.

-
+ -
+

How can I set up system-wide ad-blocking?

The recommended approach to system-wide ad-blocking is setting up domain-based @@ -750,9 +750,9 @@ used service like AdGuard with a standard block list is much less of an issue than a custom set of subscriptions / rules, but it still stands out compared to the default of not doing it.

-
+ -
+

Are ad-blocking apps supported?

Content filtering apps are fully compatible with GrapheneOS, but they have serious @@ -779,9 +779,9 @@ providing one, and very few have bothered to implement this. NetGuard is an one example implementing SOCKS5 forwarding, which can be used to forward to apps like Orbot (Tor).

-
+ -
+

Is the baseband isolated?

Yes, the baseband is isolated on all of the officially supported devices. Memory @@ -813,35 +813,35 @@ Linux kernel is monolithic and has no internal security boundaries, the attack surface is problematic and a HardMAC implementation with most complexity in the isolated firmware could be better than the status quo. An isolated driver would be ideal.

-
+

Day to day use

-
+
+ -
+
+
-
+

What features does GrapheneOS implement?

See the features page.

-
+ -
+

Does GrapheneOS provide Factory Reset Protection?

No, since this is strictly a theft deterrence feature, not a security feature, and @@ -865,9 +865,9 @@ incompatible with features designed to wipe data automatically in certain cases. This will not be implemented by GrapheneOS since it isn't a good approach and it conflicts with other planned features.

-
+ -
+

Why aren't my favorite apps bundled with GrapheneOS?

There are drawbacks to bundling apps into the OS and few advantages in most cases. @@ -907,7 +907,7 @@ cases we want to support. GPLv3 is no problem for our own usage, but we don't want to forbid using GrapheneOS as a replacement for the Android Open Source Project in locked down devices.

-
+