Introduction to GrapheneOS
Root Access vs Security Model
- Large subthread debates why GrapheneOS (GOS) refuses app‑level root.
- Pro‑root side: wants a “Qubes‑like” escape hatch, argues Android’s permission UI plus re‑authentication should be enough, and that users should be trusted to grant root wisely.
- GOS side: UI‑grantable root effectively gives root to the whole UI stack (system UI, keyboard, accessibility services), making choicejacking/tapjacking enough for persistent, undetectable compromise and breaking verified boot’s threat model.
- Consensus from GOS proponents: root via ADB/userdebug builds is already a security regression; app‑accessible root is much worse and undermines Android’s least‑privilege design.
GrapheneOS vs Other OSes (Qubes, Lineage, /e/, Librem)
- QubesOS is praised for VM‑level compartmentalization but described as focusing on containing already‑compromised guests, not hardening them; GOS aims to prevent exploitation within each “guest” (app/OS) in the first place.
- Some accuse GOS of dismissing alternative threat models (e.g., Librem 5); GOS responses emphasize missing firmware updates, insecure components, and closed firmware as deal‑breakers.
- LineageOS and /e/ are criticized for lagging months/years on security patches and integrating Google‑related or other telemetry with elevated privileges; defenders counter they’re more usable and “good enough” for many users.
- Waydroid and Linux‑phone options are mentioned but seen as far from offering comparable security models.
Pixel Hardware and Google Dependency
- Concern that GOS only supports Pixels, requiring buying Google hardware to “de‑Google.”
- GOS argues Pixels are currently the only phones meeting strict hardware/firmware and long‑support requirements; they report ongoing talks with a major OEM to add non‑Pixel devices.
- No irreversible “Knox‑style” fuse exists on Pixels; users can relock bootloaders and return to stock, though attestation keys and eFuses for rollback exist.
Profiles, Work Profiles, and Usability
- Mixed experiences: some find user profiles and Private Space extremely useful for isolating TikTok, Meta apps, work, or Google‑dependent apps, combined with per‑profile VPNs and notification forwarding.
- Others find secondary profiles clunky (separate setup, difficult file‑sharing, context switches), nearly equivalent to carrying two phones.
- GOS emphasizes these are standard Android features they lightly enhance, not central to their model; most GOS benefits do not require multiple profiles.
Sandboxed Google Play and “Why Use Google on GOS?”
- Several comments ask why one would install Google services on a privacy OS.
- Explanation: on GOS, Play Services/Store are ordinary sandboxed apps with no special privileges; permissions (including Location, Contacts) can be withheld or scoped.
- Many apps won’t run without Play APIs; GOS provides a compatibility layer that reroutes some APIs (e.g., location) to OS implementations and encourages putting Play in a dedicated profile if stronger separation is desired.
- microG is discussed as an alternative; critics note it still talks to Google for push and accounts and often runs with higher privileges than Play on GOS.
App Compatibility: Banking, RCS, Tap‑to‑Pay, Call Recording
- Banking: majority of banking apps reportedly work; ~10% block non‑certified OSes via Play Integrity. Some banks have explicitly whitelisted GOS via hardware attestation.
- Google Pay tap‑to‑pay does not work due to lack of Google certification; regional alternatives (Curve, PayPal, bank apps) work in parts of Europe.
- RCS: currently unreliable on GOS; official support via Google Messages is in progress; a long‑term goal is an independent RCS client.
- Automatic call recording is missing; some users see this as a deal‑breaker. GOS insists any implementation must visibly indicate active recording to avoid silent always‑on logging.
Community, Governance, and Drama
- Some commenters perceive the GOS project and parts of its community as dogmatic or hostile toward other ROMs and app stores; others counter that this is overblown and rooted in disagreements over threat models and update hygiene.
- A separate thread discusses a critical YouTube video about the lead developer and claims of “mental issues”; GOS supporters frame it as harassment based on fabrications and emphasize the project’s foundation structure and multiple directors.
- GOS insists technical design and patch quality—not personalities—should be the main basis for evaluation.
Practical Experiences and Tips
- Multiple users report easy web‑based installation, good battery life, and a “just unbloated Android” feel.
- Suggested usage patterns:
- Minimal‑apps approach using only FOSS via F‑Droid/other stores, no Play.
- Single profile with sandboxed Play for convenience.
- Multi‑profile setup: one for Play‑dependent/“toxic” apps, another for personal or sensitive use, each with its own VPN.
- Some concern about future Android changes to sideloading; GOS notes those apply only to certified OSes, which GOS is not.