Essential reading for hard-line GrapheneOS users in the quote note.
Almost all of the major state-sponsored or mercenary exploits you hear about are possible through memory corruption vulnerabilities in their exploit chain. They make up most of the Critical / High vulnerabilities in Android even when the amount of them have reduced due to an increase in code written in memory safe languages.
View quoted note →
Final
final@stacker.news
npub1hxx7...g75y
Cypherpunk forensic scientist and security specialist. Associate #GrapheneOS.
Matrix: f1nal:grapheneos.org
Deep dive showcase of #GrapheneOS hardened malloc by Synacktiv, a well-known offensive security company.


Synacktiv
Exploring GrapheneOS secure allocator: Hardened Malloc
Exploring GrapheneOS secure allocator: Hardened Malloc
#GrapheneOS version 2025091900 released.
- backport latest carrier and cellular radio configurations from Android 16 QPR1
- kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.152
- kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.104
- kernel (6.12): update to latest GKI LTS branch revision including update to 6.12.47
- kernel (6.6): prepare for usage on bare metal arm64 devices by setting up arm64 emulator builds (Pixel 10 uses 6.6 and earlier Pixels will likely move to it soon)
- Vanadium: update to version 140.0.7339.155.0
Releases | GrapheneOS
PSA to content creators: The GrapheneOS logo does not have a hexagon in it
Hardened Rocky Linux distribution running #GrapheneOS hardened memory allocator. More examples of Linux distributions using work we provide.
View quoted note →
Okay I'll bite, so I did the research on the case.
They posted nothing to prove he was arrested for refusing a deal with the FBI. What actually happened is he pleaded guilty to an offence in 2014 and violated the terms of his bond / probation. Unless they go forth and show more, it is horse shit.
Here is the individual pleading guilty:
https://storage.courtlistener.com/recap/gov.uscourts.mied.374280/gov.uscourts.mied.374280.1.1.pdf
He was arrested for not paying his bond, using a computer when he was forbidden to, ignored communications with his probation officer and more.
Here is the petition of warrant to see what violations of his Bond he used:
https://storage.courtlistener.com/recap/gov.uscourts.mied.374280/gov.uscourts.mied.374280.3.0.pdf
How could he have been operating Tor nodes past 2014 if he wasn't allowed to have computers?
I hate cops, but he deliberately tried to set them up. He refused to show up so they went to his door and so they arrested him. There were warrants out for his arrest.
Here is the arrest warrant:
https://storage.courtlistener.com/recap/gov.uscourts.mied.374280/gov.uscourts.mied.374280.20.0.pdf
View quoted note →
A contributor for #GrapheneOS has been co-credited by Apple for information regarding a security vulnerability in USB Restricted Mode for Apple operating systems.
>CVE-2026-43262: Purophoria, an anonymous researcher of GrapheneOS, James J. Kalafus, Michel Migdal
Congratulations to our contributor.
Apple Support
About the security content of macOS Tahoe 26 - Apple Support (CA)
This document describes the security content of macOS Tahoe 26.
Build your own open source trackball mouse.
Thats all.
You won't regret it
View quoted note →
Ploopy Classic 2 Trackball – Ploopy
View quoted note →Keyboards and switches used by project team members when I asked:
1. "Keychron K2 Max" (Keychron Super Banana switches)
2. Weikav D75 with Kailh BOX Royals
3. (Photo of a split keyboard with palm rests)
4. "MMD Princess switches" / "Cherry MX2A Speed Silvers are my favourite"
5. "Waiting for my Hyper 7 to arrive"
View quoted note →
Build your own keyboard.
That's all.
You won't regret it