GrapheneOS will remain usable by anyone without requiring personal information
GrapheneOS stance and legal context
- Thread centers on GrapheneOS’ commitment to remain usable without tying devices to personal identity or age‑verification.
- Several comments see recent and proposed laws (California age‑range signaling at OS level, Texas/Utah “commercially reasonable” age checks, Canadian S‑209, Brazilian Felca law) as steps toward mandatory identification and remote attestation.
- Some argue California’s approach seems weaker than ID scans, others stress it still creates broad liability and incentives for invasive age checks (face/ID scans) and globalized censorship.
Banking, e‑ID systems, and remote attestation
- Nordic users highlight how deeply BankID/Swish‑style national e‑ID and payments are tied to smartphones, making alternative OSes a practical problem.
- Multiple reports that Swedish (and some Norwegian) banking and ID apps work fine on GrapheneOS today; some keep a second phone as backup.
- Technical discussion of Play Integrity vs hardware attestation: GrapheneOS only passes “basic integrity”, so some banks may block unless they explicitly support GrapheneOS keys.
- A Brazilian commenter reports major banks now blocking GrapheneOS after an age‑verification law, even with Google services installed.
Device support and Motorola partnership
- Debate over GrapheneOS’ new Motorola partnership: seen as good diversification beyond Pixels but also a possible regulatory target if preloaded devices become common.
- Some expect workarounds (sell stock ROM, let users flash GrapheneOS; relocate jurisdiction; use third‑party sellers), but this is speculative within the thread.
- Pixels are described as unusually open for custom keys, but this is seen as contingent on Google’s future choices.
User migration experiences and app ecosystem
- Shared migration patterns: GrapheneOS as main OS plus a cheap stock‑Android phone for banking/ID, or separate user profiles/private spaces with sandboxed Play Services.
- A linked iOS→GrapheneOS guide is criticized as outdated and blaming Android‑wide issues on GrapheneOS; others say the guide’s annoyance list convinced them not to switch.
- Conflicting reports on UX: some mention issues like media handling, UI quirks, audio volume, and lockscreen behavior; others say these problems don’t occur for them.
Privacy vs usability trade‑offs
- Many praise GrapheneOS hardening, sandboxed Play, and the ability to tightly restrict Google and other apps, while still using mainstream software.
- Others object to lack of root access, arguing that it gives OS vendors more control than users and hampers deep inspection/monitoring.
- Discussion of app sources: Play Store seen as simplest; Aurora Store and F‑Droid mentioned, with caveats about security and reliability.
Emergency alerts and government control
- Canadians and others complain about unskippable, misused emergency/Amber alerts, especially at night.
- GrapheneOS’ ability to disable “presidential”/overriding alerts is highlighted as a concrete advantage, contrasted with stock Android and regional abuses.
Custom ROMs, regional restrictions, and trust
- Broader examples of region‑based restrictions (call recording bans, mandatory camera shutter sounds in Japan, BeiDou geofencing in the US) show how firmware/OS enforce policy.
- Some build their own ROMs to bypass such restrictions.
- A few express concern about trusting a project whose build pipeline is run by pseudonymous maintainers, though others note all OS projects have similar trust issues.