#GrapheneOS version 2025092500 and Security Preview 2025092501 released:
This update adds more Android 16 QPR1 backports and the ability to opt-in to Security Preview updates. The Security Preview update channel have very early full patches that are held under an embargo.
The first Security Preview will contain extremely early security patches scheduled to be released in Android by December. The security preview provides patches for 55 (1 critical, 54 high) vulnerabilities.
Changes added to 2025092500:
- System Updater: add support for opting into security preview releases
- backport more cellular related code from Android 16 QPR1
- backport Pixel Wi-Fi extension APEX from Android 16 QPR1
- Vanadium: update to version 140.0.7339.207.0
Additional security patches from the November 2025 and December 2025 Android Security Bulletins are included in the 2025092501 security preview release. List of additional fixed CVEs:
Critical: CVE-2025-48593
High: CVE-2022-25836, CVE-2022-25837, CVE-2023-40130, CVE-2024-43766, CVE-2025-22420, CVE-2025-22432, CVE-2025-32348, CVE-2025-48525, CVE-2025-48536, CVE-2025-48544, CVE-2025-48555, CVE-2025-48567, CVE-2025-48572, CVE-2025-48573, CVE-2025-48574, CVE-2025-48575, CVE-2025-48576, CVE-2025-48577, CVE-2025-48578, CVE-2025-48579, CVE-2025-48580, CVE-2025-48581, CVE-2025-48582, CVE-2025-48583, CVE-2025-48584, CVE-2025-48585, CVE-2025-48586, CVE-2025-48587, CVE-2025-48589, CVE-2025-48590, CVE-2025-48592, CVE-2025-48594, CVE-2025-48595, CVE-2025-48596, CVE-2025-48597, CVE-2025-48598, CVE-2025-48600, CVE-2025-48601, CVE-2025-48602, CVE-2025-48603, CVE-2025-48604, CVE-2025-48605, CVE-2025-48607, CVE-2025-48609, CVE-2025-48611, CVE-2025-48612, CVE-2025-48614, CVE-2025-48615, CVE-2025-48616, CVE-2025-48617, CVE-2025-48618, CVE-2025-48619, CVE-2025-48620, CVE-2025-48621
We're allowed to provide an early release with these patches and to list the CVEs but must wait until the embargo ends to publish sources or details on the patches. We strongly disagree with broadly distributing patches to OEMs 3-4 months before the official publication date. It further delays getting patches to users and sophisticated attackers will have no issue getting the patches from one of many people at Android OEMs with early access. It should be limited to at most 7 days. The lack of actual secrecy has been acknowledged through Android limiting the embargo to source code and details which allows us to fix these early. We're doing it with separate opt-in releases to keep the regular releases properly open source instead of delayed open source. We plan to integrate this choice into the initial setup wizard. The positive side is that we can now provide patches to people who truly need them without even the previous 1 month embargo delay.
Final
final@stacker.news
npub1hxx7...g75y
Digital forensics and security specialist part of the GrapheneOS project.
Posts my own and not endorsed by my employer. AI slop and Nostr DMs ignored.
Matrix: f1nal:grapheneos.org
Next release of #GrapheneOS will add support to opt-in for Security Preview releases. These will be separate release channels for users to receive security patches that have source code and vulnerability information under an embargo.
The next security preview contains early patches for 1 Critical vulnerability, and 54 High vulnerabilities.
For users of the 'Helium' browser going all over Twitter, it is ungoogled-chromium based, so the following flags are available.
They advertised it on their site, but there's no full docs releases by them. Putting here so most can see it.
Not an endorsement of a browser, especially one that is so new. People conscious about their security should stick to established apps that they trust.
View quoted note →
This ergonomics shit is serious
Put the top of your monitor at level to your eyes
Avoid bending your neck
Keep monitor an arms reach away
Ensure shoulders do not shrug when you type
Do not bend your wrists
Do not lean forwards
Keep arms, shoulders, legs straight
Ensure feet are touching a surface
Use an adjustable padded seat
Make sure the height is high enough to sit with your knees further down than your thighs
Have the back straight or very slightly leaned backwards
Stand up and walk around every 30 minutes
View quoted note →
Had to bring this burned npub post back.
View quoted note →
Researchers at Trinity College Dublin, lead by Professor Doug Leith did a report to determine if Airplane Mode in #GrapheneOS and other devices actually disabled cellular. It doesnt have any cellular transmissions.
https://www.scss.tcd.ie/Doug.Leith/pubs/airplane_mode_report.pdf
There is a radio activity spike at the 2.4GHz band, this suggests Wi-Fi activity and is different from cellular network activity.
All credit to Doug here:
Doug Leith
The Linux kernel is a gigantic, complex project written pretty much entirely in a memory unsafe language. It is a monolithic kernel with no internal sandboxing/isolation and all the normal code running as part of them is fully privileged. A little typo causing memory corruption can be used to perform dangerous attacks.
The Linux kernel alone is focused on performance and compatibility, not security.
Even with the countless hardening work and security tools we make for Linux (hardened malloc), Linux is the core security liability in GrapheneOS. If people want the security of the operating system to go beyond, then the Linux kernel must be replaced with something new from the bottom up.
Our roadmap page was updated to reflect our approach better.
The initial phase for the long-term roadmap of GrapheneOS is to deploy and integrate pKVM and CrosVM. We would securely deploy Android apps in virtualized environments using this virtualization setup. Virtualization will allow us to contain Linux. In the longer term, Linux inside the sandboxes can be replaced with a compatibility layer like gVisor, which would need to be given a new backend alongside the existing KVM backend. Over the longer term, i.e. many years from now, Linux can go away.
View quoted note →
Frequently Asked Questions | GrapheneOS
Essential reading for hard-line GrapheneOS users in the quote note.
Almost all of the major state-sponsored or mercenary exploits you hear about are possible through memory corruption vulnerabilities in their exploit chain. They make up most of the Critical / High vulnerabilities in Android even when the amount of them have reduced due to an increase in code written in memory safe languages.
View quoted note →
Deep dive showcase of #GrapheneOS hardened malloc by Synacktiv, a well-known offensive security company.


Synacktiv
Exploring GrapheneOS secure allocator: Hardened Malloc
Exploring GrapheneOS secure allocator: Hardened Malloc
#GrapheneOS version 2025091900 released.
- backport latest carrier and cellular radio configurations from Android 16 QPR1
- kernel (6.1): update to latest GKI LTS branch revision including update to 6.1.152
- kernel (6.6): update to latest GKI LTS branch revision including update to 6.6.104
- kernel (6.12): update to latest GKI LTS branch revision including update to 6.12.47
- kernel (6.6): prepare for usage on bare metal arm64 devices by setting up arm64 emulator builds (Pixel 10 uses 6.6 and earlier Pixels will likely move to it soon)
- Vanadium: update to version 140.0.7339.155.0
Releases | GrapheneOS