Neko

1.1K posts

Neko banner
Neko

Neko

@NekoRuns

Speedrun idiot. PFP - @ywuria

Katılım Aralık 2021
29 Takip Edilen77 Takipçiler
Neko
Neko@NekoRuns·
@GrapheneOS If that was figured out, I'd have nearly no reason left to use Twitter!
English
0
0
0
187
GrapheneOS
GrapheneOS@GrapheneOS·
Most of our users aren't active on these social media platforms and don't receive news about GrapheneOS beyond our release notes. Hundreds of thousands of people use it as a daily driver without closely following the project. We plan to reduce our dependence on these platforms.
English
94
95
1.9K
56.1K
Kobo Kanaeru (こぼ) ☔ @ホロライブID
‼️‼️‼️‼️‼️‼️ Would you take a guess of my new costume?❄️ I will be reviewing your submission on my Anniversary Stream on 27th March !✨ Use this hashtag so I can see your submission‼️⤵️ #Kobo4thAnniversary
Kobo Kanaeru (こぼ) ☔ @ホロライブID tweet media
English
181
1.4K
14.1K
370.6K
Neko retweetledi
Mullvad.net
Mullvad.net@mullvadnet·
Mass surveillance and censorship are escalating in many countries right now. There is a global attack on secure encrypted communication. Often, authorities, politicians, and tech companies work together to push for new laws. One example: when Ashton Kutcher (yes, the actor), through his tech company Thorn, tried to introduce total surveillance of all EU citizens through undemocratic and corrupt methods. First, Ashton Kutcher convinced the EU Commission that they could scan everything on an EU citizen’s phone or computer (messages, photos, emails, phone calls, all of it) for child sexual abuse material without, at the same time, looking at the content of other types of communication. And then? And then EU Commissioner Ylva Johansson presented the legislative proposal called Chat Control, which aimed to scan everything on all EU citizens' phones and computers (including conversations in end-to-end-encrypted messaging services). The message from the Commission was: we will only search for child sexual abuse material (CSAM). And then? And then experts from all over the world explained to her that the kind of scanning she was talking about (as Ylva described it: a drug-sniffing dog that can detect illegal content in a message without reading the message) simply cannot be done safely, and that Chat Control would mean the end of privacy and pose a security threat to all Europeans. Ylva responded with: “what about the children?” And then? And then it was revealed that Thorn, the organization founded by Ashton Kutcher and which had been lobbying for Chat Control from the beginning, was selling the kind of scanning technology that could be used for Chat Control – despite being registered as a charity organization in the EU’s lobbying registry. And then? And then it was revealed that Thorn, together with the EU Commission, had also started and funded “children’s rights organizations” that had supported the proposal. What appeared publicly to be charitable organizations were in fact lobby groups. And then? And then it was revealed that Europol wanted unlimited access and wanted to use the scanning for more than just child abuse crimes, saying that all data – also unfiltered and innocent material – should be stored because it “could at some point be useful to law enforcement”. And then? And then it was revealed that employees at Europol had joined Thorn, to lobby their old colleagues. And then? And then politicians in Brussels wanted to exempt themselves from the scanning. And then? And then the European Parliament, in an almost historic consensus, voted against the proposal and called Chat Control nothing but mass surveillance. As one of the members of the parliament said: “The Commission wasn’t focusing on protecting children but wanted mass surveillance.” And then? And then The Council of the EU (law proposals must go through both the Parliament and the Council), after three years of negotiation, finally reached a common position on Chat Control. The requirement for mandatory scanning (including end-to-end encrypted messaging services) was removed, which is a major victory, but several problematic elements remain in the Council's position. For instance, the Council wants to demand ID Control to use messaging services (including end-to-end encrypted). And then? And then, in 2026 the final negotiations began, between the European Commission, the European Parliament, and the Council of the EU. At the same time, the European Commission is working on a Plan B, through the initiative Going Dark/ProtectEU, where they once again try to force total surveillance (this time organized crime is the excuse) on the citizens of the EU. And then? youtube.com/watch?v=fPzvUW…
YouTube video
YouTube
English
63
640
2.1K
131.2K
Neko
Neko@NekoRuns·
@eculoos @GrapheneOS For logging into twitter? Network & Internet > Internet connectivity checks > Standard (Google) server. Works for me.
English
0
0
0
32
Neko retweetledi
Mullvad.net
Mullvad.net@mullvadnet·
The UK has announced plans to fast-track legislation requiring “age verification for VPN use”. The correct term, however, is not age verification but identity verification. A law like this would require everyone to identify themselves in order to use a VPN. This would pose a risk to whistleblowers, violate human rights, and represent yet another step toward an authoritarian society.
English
287
2.9K
16.4K
643.8K
Neko
Neko@NekoRuns·
@msfv___ @GrapheneOS @adbjunkie @Canada Saying "I don’t have to prove anything." is crazy when talking about a trusted project that Edward Snowden supports, and how it's supposedly insecure and a borderline scam. I thought claims had to be backed up with evidence.
English
0
0
2
25
GrapheneOS
GrapheneOS@GrapheneOS·
x.com/7SEES_/status/… GrapheneOS has never pretended to be impenetrable to exploits. We're careful to communicate that it provides much better protection against exploits rather than being immune to them. We've absolutely never misled people as is being falsely claimed. Pointing to Cellebrite documentation from 2024 and 2025 showing they can only exploit After First Unlock state GrapheneOS devices if they haven't been patched since 2022 shows GrapheneOS working extremely well. Our locked device auto-reboot timer is set to 18 hours by default and triggers memory zeroing restoring the device to Before First Unlock state. Users can set it as low as 10 minutes if they want that to happen quicker. Over 3 years is certainly more than the default 18 hours or the previous default of 72 hours. How is that in any sense a failure? It's far better than what we expected to achieve and is an enormous success at protecting users. Defending against attackers with physical access is far harder than defending against fully remote attacks. GrapheneOS started in 2014 and was originally primarily focused on defending against remote attacks and overall privacy. Remote attacks are harder to pull off both technically and operationally. GrapheneOS continues building stronger defenses against it. Defending against attackers with physical access to an After First Unlock state device wasn't originally a focus of GrapheneOS. We had USB peripheral blocking while locked since around 2015 but that was greatly improved in early 2024. We expanded it to block USB connections as a whole while locked at a hardware level in addition to the software level along with disabling USB data at a hardware level. Many other defenses were added to protect devices against data extraction in 2024 and 2025. Our locked device auto-reboot feature was added in 2021 which was then enabled by default (72 hours) and set to a lower timer (18 hours) more recently. It should be expected that Cellebrite will eventually develop a working exploit chain for an After First Unlock state GrapheneOS device. Delaying them developing a working attack for so long has been a huge success. We'll continue making improvements so if they do succeed at making another it won't last indefinitely. It will also still be heavily constrained by our locked device auto-reboot feature which has now been adopted in a weaker way by iOS 18.1+ and optin for Android 16+. We make setting a strong passphrase convenient via our 2-factor fingerprint unlock feature. If users set a strong passphrase, they don't depend on secure element throttling as they do with a random 6 digit PIN. A strong passphrase combined with Before First Unlock state prevents any combination of hardware and software exploits bypassing encryption. If people use a random 6 digit PIN then they're choosing to depend on the secure element but in practice that still provides quite a high level of security which has held up for years since the launch of the Pixel 6 with the Titan M2. GrapheneOS users can use a strong passphrase with fingerprint+PIN secondary unlock combined with a short auto-reboot timer for extremely high security against data extraction where there's only a short window in After First Unlock state. Heavily depending on hardware and OS security against physical data extraction is a choice. Cellebrite and similar companies have massive resources. The amount of funding, developers, etc. we have available is tiny compared to them. We can achieve far more as our resources continue growing and as we begin making major improvements as a hardware and firmware level with OEM / SoC partners. GrapheneOS never claimed to be able to provide anything close to the level of security it has ended up providing against these attacks in practice. We greatly underestimated how well it would hold up to them. It doesn't mean it will remain that way but we aren't claiming it will or depending on that happening. It's not supposed to be perfect or impenetrable. We wouldn't have a locked device auto-reboot timer if it was supposed to completely prevent exploitation...
7SEES@7SEES_

If you have WhatsApp, Signal, if you've ever opened a PDF on your device, if you run iOS, Android, and even an OS like Graphene, your chances of having this software on your phone is more than zero. Even Graphene pretends to be uncrackable, but clever marketing is used to cover up the fact that many of their distros are only "uncrackable" until you unlock the device the first time, (After First Unlock - AFU), any time you power it on. At least, this was the case in March 2025, I haven't checked on any new indexes lately.

English
20
98
1.3K
66.9K
Neko
Neko@NekoRuns·
@ReiMikadoVT Are they layered properly? The order often matters. Would help to see what you have.
English
1
0
0
21
Neko retweetledi
Diva
Diva@hyxpk·
I’ve started learning animation. It’s fun to watch them move. 😊
English
60
656
5.2K
60.7K
GrapheneOS
GrapheneOS@GrapheneOS·
We need more 10Gbps or higher dedicated servers for hosting our OS and app updates. We have North America covered well enough via sponsored servers from ReliableSite in both Miami and Los Angeles and a sponsored server from Xenyth in Toronto but no longer have any left in Europe.
English
108
161
2.6K
111.8K
Neko
Neko@NekoRuns·
@AncapAir @X @GrapheneOS Network & Internet > Internet connectivity checks > Standard (Google) server. Worked immediately for me.
English
0
0
1
128
𝘼𝙣𝙘𝙖𝙥 𝘼𝙞𝙧 🛫
Welp, looks like @X is no friend of @GrapheneOS. Can't login on the app, which honestly is probably for the best... This error I believe is an integrity check for the app. No Google Services, no login. I could be wrong, but oh well...
𝘼𝙣𝙘𝙖𝙥 𝘼𝙞𝙧 🛫 tweet media
English
39
1
72
3.9K
Neko
Neko@NekoRuns·
"I wanted these facts to be clear." What facts? And what was cleared? Nothing is verified, and nothing is explained.
English
0
0
0
30
Neko
Neko@NekoRuns·
"I should’ve taken it more seriously in the moment." Yes, you shouldn't have been supposedly deleting files, and cresting new files, and acting weird when other files were shown. "I’m owning up to that". You've owned up to basically nothing.
English
1
0
0
34
Neko retweetledi
Wuthering Waves
Wuthering Waves@Wuthering_Waves·
Wuthering Waves | Resonator Showcase | Aemeath — GRADUATION SHOW Happy graduation! Follow @Wuthering_Waves and repost. 10 winners will be chosen for a $50 Amazon Gift Card.
English
248
4.1K
11.7K
1.8M
Neko
Neko@NekoRuns·
@neneneqo You know what? Just keep it. I'm just getting the GTA 6 treatment now.
English
0
0
0
97