Awesome logo!
That is cool!
What about making it a bit more like a racoon and a little less like a badger?
New take:
I love this one-man show. Android OS minimalist,transparent. Respects privacy as much as possible, as safe as possible. Developer S.Zeppelin seems to have an âallergyâ to non-transparent companies:-) Thank you guys. May FOSS be with you !
Man, I respect other opinions, but Iâm not interested in yours. Nonetheless:
My attempts to make donations to Tad have failed.
The new user would gladly and immediately support your work, but not with existing payment options via Stripe (bank card), Liberapay, Bitcoin, Monero.
My last offer to send SkewedZeppelin a donation in the form of a Xiaomi Mi A2 was wordlessly ignored for four days, after which I removed it. Iâve understanding for waywardness, but not for snootiness.
Feel free to @me, and I can provide the files if you are interested in using my icon
Edit: it is kind of sad to see Mull without an icon on F-Droid and eOS app store </3
Hiya, welcome!
All DivestOS devices are signed with unique keypairs as generated by this script: Scripts/Generate_Signing_Keys.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab
Devices have had unique keys since 2019/09/13.
Devices have had non test-keys since 2015/11/20.
And builds are signed here: Scripts/Common/Functions.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab
Here are the verified boot enablement scripts: Scripts/Common/Enable_Verity.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab and Scripts/Common/Copy_Keys.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab
And the public verified boot hashes, usually shown on bootup: Verified Boot Hashes - DivestOS Mobile generated by Scripts/Generate_Verified_Boot_Hashes.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab
Also related the support files script: Scripts/Generate_Supporting_Files.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab
And the WebView script: Scripts/WebView_Update_Repo.sh ¡ master ¡ DivestOS Mobile / DivestOS-Build ¡ GitLab
Because it may not be obvious, the WebView compile script: build-webview.sh ¡ master ¡ DivestOS Mobile / Mulch ¡ GitLab
Feel free to use them per the license.
My original post was a mistake and thatâs why I deleted it even before you responded.
Having said that, I agree with others who say you need to get off your high horse.
You took it upon yourself to appear in one of my threads on XDA with negative remarks about my rom and at the same time promoting your own (youâve been deleted there). Hardly a good behavior.
About DivestOS: Your software cannot be qualified as an independent development. It is just a small layer on top of Lineage. A layer that for the most parts contains some hardening commits from GrapheneOS.
Unlike Graphene developers, you have no control over the base rom. For example, you must wait for Lineage to merge security patches and often they are late. You canât control their features, you canât control their code. You must wait for them to fix their mistakes. You canât implement features etc etc.
So, if I were you, Iâd stay away from your âsnidingâ others and concentrate on your own development.
Best regards.
@optimumpro
Iâm not here to argue.
My comment in your thread was in direct response to someone asking the difference between my OS and your OS.
Your OS is proprietary, it isnât necessarily a negative in context as clearly shown by your active forum threads with many users.
Your OS does not make it clear what changes are actually made OR who made it originally if not you, that is something you can improve on.
You do actually do a good job pulling in -stable patches into your kernels which is nice! Seriously not enough projects do that.
you must wait for Lineage to merge security patches
I consistently push them out before they do?
See https://divestos.org/misc/a-dates.txt and Patch Counts - DivestOS Mobile
I have never encrypted my back up, nor have I ever used a password manager.
-
I am thinking to encrypt all my files before uploading to mega. Is this the correct approach if I want privacy and security? I mean is there any weakness in this approach? I think it depends on the encryption I use, and the password, and they can see metadata, like file size, date of upload etc.
And which should I use? on internet I see people saying i) use AES 128 as it is more than enough and is faster, ii) AES 256 is necessary even though it takes more time. -
I want an offline password manager for both linux and android. I have heard keepassxc for linux and keepassdx for android is good. Is this alright or are there better alternatives? And I am okay to back it up manually, so is it alright if I store the passwords on mega after encrypting?
Thank you!
Keepassxc/dx is a great solution i personally use them and sync the database between desktop and mobile using syncthing.
To encrypt files in case you can also use pgp.
I use passwordstore.
I stores the passwords in single pgp encrypted files and thus feels very âunixyâ and future-proof. The Android client works very well and gets updates from time to time.
It sets up the folder of password files as a git repo and comes with good git integration. So using a git server as backup and central distribution is pretty much a no-brainer.
I can NOT really say anything about keepassdx. But my git server for my passwords is a private repo at github (yes, yes, yes. Go on and sue me). I discussed this beforehand with fellow software engineers and we all agreed that this is save. This is what the enryption was invented for. If everything in your keeypass fole is encrypted you should be fine just as well.
One minor note: if you are going to put your password file ANYWHERE outside your computer its best to treat it like it was completely public. As such you want it to still be protected in 10 or 20 years. We might see widespread quantum computers in that timeframe. And if we do your âgood old RSA encyptedâ files will not be save anymore. So I donât think it would be overkill to opt for so called âpost-quantumâ encrpytion (like Ed25519)
Yes. In the case of passwordstore there is a little information leak since you usually use urls of websites as file names. So theoretically âtheyâ (in your case mega. In my case github) know that I have an account for the F-Droid forum . . . or pornhub. But my username and password are save and secret âout in the open and encryptedâ.
Hi everyone, Iâm running DOS 19.1 on FP3 after a flawless bootloader-relock.
I only just noticed that my WiFi security is set to WPA/WPA2 with no option to change the security setup from within the Android network settings. I set my router to WPA2/3 transition mode so the connection defaults to WPA2, yet Iâm worried that in future connections with other networks a downgrade to WPA would be possible.
I recall having a working WPA3 setup a few months ago, yet I was running LineageOS 18.1 back then so
Iâm not sure whether the issue is related to the switch to DivestOS per se, the upgrade from 18.1 to 19.1 (including different menu structures) or my specific network (havenât gotten around to checking with many different networks). Resetting the WiFi connections on my phone or rebooting the router havenât had any effect; my notebook has a stable WPA3 connection within the same network.
Has anybody had similar issues? Any suggestions?
@doktorbrausefrosch
In general I recommend against using mixed-mode WPA2/WPA3.
Make a distinct WPA2 and WPA3 SSID on your access point if possible.
Benefits are better knowledge that a connection to a given SSID is the encryption you expect, prevents sharing group keys with lesser encrypted devices, and Iâve also found improved compatibility.
While Iâm here, Iâll leave a fun fact: only WPA3 and WPA2-EAP provide PFS.
@SkewedZeppelin
Mixed mode is the best my router OS can do (seems not to be supported by OpenWRT btw). So is there any way to switch to WPA3 from within DivestOS, or at least force WPA2 for all networks without leaving the WPA-option open? And any plausible explanation that I seemingly canât choose the setup manually anymore (âNetwork details â Securityâ is greyed out)? Help is greatly appreciated, as always!
For the Android side you can explicitely choose the WPA if you choose âadd hidden networkâ.
For the router side, OpenWrt does support this at least for SoftMAC. Perhaps youâre on an old version?
@SkewedZeppelin
Thanks again, manually re-adding it worked!
My OpenWRT comment was misleading, I meant to say that my hardware is not supported so Iâm running the stock OS on my router.
Ed25519 is vulnerable to quantum computers.
Always use symmetric encryption for backups.
Yes, of course there is weakness. The thing is, it costs resources, how important are you?
If uâre paranoid enough, just donât upload it to internet.
This one. Use open source software please, better if audited.
Thatâs right.
Iâm not sure whether to report this here or upstream, so apologies if this is not DivestOS related, instead being a LOS thing.
Thereâs a bug where if you set your phoneâs resolution to a different value than stock (say divide dimensions by 1.5 to reduce battery consumption and increase performance at virtually no visual cost), the fingerprint icon for verifying fingerprints gets shifted in the bottom right direction, making it impossible to unlock via fingerprint.