Googleā€™s latest flagship smartphone raises concerns about user privacy and security. It frequently transmits private user data to the tech giant before any app is installed. Moreover, the Cybernews research team has discovered that it potentially has remote management capabilities without user awareness or approval.

Cybernews researchers analyzed the new Pixel 9 Pro XL smartphoneā€™s web traffic, focusing on what a new smartphone sends to Google.

ā€œEvery 15 minutes, Google Pixel 9 Pro XL sends a data packet to Google. The device shares location, email address, phone number, network status, and other telemetry. Even more concerning, the phone periodically attempts to download and run new code, potentially opening up security risks,ā€ said Aras Nazarovas, a security researcher at Cybernewsā€¦

ā€¦ ā€œThe amount of data transmitted and the potential for remote management casts doubt on who truly owns the device. Users may have paid for it, but the deep integration of surveillance systems in the ecosystem may leave users vulnerable to privacy violations,ā€ Nazarovas saidā€¦

You are viewing a single thread.
View all comments View context

If you only care about security, you should keep Play Services isolated in a separate profile. That way, even if there happens to be a memory corruption vulnerability in Play services, which isnā€™t caught by hardened_malloc or the hardware MTE in newer devices with ARMv9 chips, the rest of your system would still be safe, since Play services arenā€™t running as root, and in order to compromise the entire system, there would need to be a privilege escalation vulnerability in all of Android, not just Play services.

And you know what helps reduce risk of exploit? Smaller codebases.

Why does CalyxOS include the F-Droid privileged extension then? Itā€™s yet another component running with elevated permissions and unnecessarily increasing attack surface. Why does it include Googleā€™s eUICC component with elevated privileges and no proper sandboxing?

permalink
report
parent
reply
1 point
*

Errā€¦ That component appears to be built from source per Calyxā€™s Gradle rules? The source is pulled from here: https://android.googlesource.com/platform/frameworks/base/+/refs/heads/main/telephony/java/android/telephony/euicc

My hardware is too old to support MTE. Iā€™m running a pixel 3 because Iā€™m more worried about damaging our earthly environment with this constant hardware churn.

Iā€™m sorry youā€™re unhappy that Iā€™m happy. Iā€™m still able to run Android 14 in a reasonably secure manner, Iā€™m able to exchange information with other people easily, without Google getting much information from me, and thatā€™s satisfactory. My actual security relevant machinations happen on my much better protected laptop.

Thanks for your input, have a nice day.

permalink
report
parent
reply

Errā€¦ That component appears to be built from source per Calyxā€™s Gradle rules? The source is pulled from here: https://android.googlesource.com/platform/frameworks/base/+/refs/heads/main/telephony/java/android/telephony/euicc

Thatā€™s apparently not the entire thing though. I havenā€™t used CalyxOS in a long time, could go to the settings menu for adding a new eSIM and take a screenshot of it?

Iā€™m sorry youā€™re unhappy that Iā€™m happy.

Oh Iā€™m absolutely not. Iā€™m glad you found an OS you like, I just pointed out that GrapheneOS is far superior in terms of privacy and security, and therefore probably the better choice, but you are obviously free to use whatever suits your needs and makes you happy. And itā€™s better than the stock OS I guess.

My actual security relevant machinations happen on my much better protected laptop.

How do you protect a laptop to be more secure than a modern mobile device? Desktop operating systems are inherently less secure, since they lack proper application sandboxing, they often donā€™t even have mandatory access control mechanisms (such as SELinux or AppArmor) in place and donā€™t have a good way of verifying the boot image. Secure Boot is broken and essentially useless, and canā€™t be compared to Android Verified Boot whatsoever. TPMs arenā€™t secure either, and canā€™t even remotely be compared with proper secure elements such as the Google Titan M2 or Appleā€™s Secure Enclave. Do you use QubesOS, or how did you achieve better protection on your laptop compared to your smartphone?

permalink
report
parent
reply

DeGoogle Yourself

!degoogle@lemmy.ml

Create post

A community for those that would like to get away from Google.

Here you may post anything related to DeGoogling, why we should do it or good software alternatives!

Rules

  1. Be respectful even in disagreement

  2. No advertising unless it is very relevent and justified. Do not do this excessively.

  3. No low value posts / memes. We or you need to learn, or discuss something.

Related communities

!privacyguides@lemmy.one !privacy@lemmy.ml !privatelife@lemmy.ml !linuxphones@lemmy.ml !fossdroid@social.fossware.space !fdroid@lemmy.ml

Community stats

  • 331

    Monthly active users

  • 301

    Posts

  • 4.6K

    Comments