France threatens GrapheneOS with arrests / server seizure for refusing backdoors
Media reports and French authorities’ stance
- Several French newspapers with a pro‑police/right‑leaning reputation framed GrapheneOS as a “narco‑traffickers’ tool,” implying that merely using it is suspicious and tied to intent to conceal.
- The head of the Paris cybercrime unit is quoted saying they would “not hesitate to prosecute publishers” if links to organized crime are found and they do not “cooperate with justice.”
- Some commenters see this as part of a longstanding pattern: governments using drugs/terror/CSAM to justify attacks on encryption and privacy tools (e.g., ChatControl in the EU).
GrapheneOS’s interpretation and reaction
- GrapheneOS claims French authorities have explicitly threatened Encrochat/SkyECC‑style treatment (server seizure, mass arrests) if they don’t help provide access to devices.
- They say police and media are conflating GrapheneOS with commercial “secure phone” vendors that fork their code and add non‑existent features, then attributing those features back to the project.
- In response, GrapheneOS states they are pulling infrastructure out of France/OVH and won’t hire in France without relocation, arguing France is unsafe for open‑source privacy projects.
Dispute over how real the threat is
- Some participants argue the HN title and GrapheneOS’s framing are exaggerated: the press quotes are conditional (“if links are discovered and there’s no cooperation”), and there is no explicit legal basis for mandating backdoors.
- Others reply that waiting for the first raid or warrant is naive; public hit pieces are often the opening move in building support for new laws or aggressive enforcement.
Backdoors, technical limits, and trust
- Multiple comments stress that truly secure systems cannot offer law‑enforcement‑only access; any backdoor is a systemic vulnerability.
- GrapheneOS describes its design: secure element “Weaver” throttling, strong passphrases, and Titan M2 insider‑attack resistance, arguing they can’t technically bypass disk encryption even if coerced.
- There’s some speculation about GrapheneOS itself being a honeypot; others counter with its open source, reproducible builds, and public non‑profit status, while noting there is no formal third‑party audit.
Broader political and societal context
- Many see this as part of a wider European drift toward authoritarian digital policy, with France singled out as particularly hostile to privacy.
- Others highlight law‑enforcement concerns about organized crime, arguing that encryption and hardened devices do hamper investigations, and foresee growing political pressure on tools like GrapheneOS and Signal.