GrapheneOS fixes Android VPN leak Google refused to patch
Google’s handling of the VPN leak
- Many commenters criticize Google for classifying the leak as “not a security issue,” especially because it occurs in
system_server, a privileged process. - Android’s own lockdown mode promises that no traffic bypasses the VPN; this behavior violates that promise at the kernel level.
- Some see this as a clear security bug (sandbox escape / privilege escalation); others suggest Google may be operating under a narrower definition linked to its bug bounty program.
What a VPN should guarantee
- Disagreement over the role of VPNs:
- One view: VPNs were originally for corporate network access; privacy/anonymity guarantees were never core.
- Another view: Modern users reasonably expect “all traffic goes through the tunnel,” so any bypass is a critical privacy failure.
- It’s noted that iOS and macOS have had similar “always-on VPN” bypasses, suggesting a broader OS design pattern.
GrapheneOS’s fix and broader VPN work
- GrapheneOS mitigates the leak by disabling the
registerQuicConnectionClosePayloadoptimization; VPN functionality and QUIC still work. - Developers mention they have already fixed multiple Android VPN leaks and plan deeper architectural changes (e.g., better per-profile isolation, potential VM-based app isolation).
Trust, surveillance, and platform incentives
- Several comments frame stock Android as adware/spyware, arguing that Google’s ad and offense-related business interests disincentivize strict VPN enforcement.
- Some speculate that governments and large organizations value such de-anonymization vectors, though concrete evidence is not provided in-thread.
- There’s discussion that terms like “private” and “trust” are easily misunderstood by non-experts.
Hardware support: Pixels, bootloaders, and Motorola
- GrapheneOS currently targets Pixels; some are reluctant to buy Google hardware for ethical or reliability reasons, despite others praising the security features (MTE, Titan M2) and long support windows.
- Carrier-locked Pixels (especially Verizon in the US) often cannot unlock bootloaders, blocking GrapheneOS installs; buying directly from Google or proven-unlockable used devices is advised.
- A partnership with Motorola is discussed; support is expected in future models, but price and timeline details remain uncertain/unclear.
Alternatives: other ROMs and Linux phones
- LineageOS is praised for UX; GrapheneOS for security; CalyxOS for a more “vanilla” feel, though its security posture and bundled apps are heavily criticized by some.
- Linux phones (Librem, postmarketOS devices, Fairphone) are mentioned:
- Pros: independence from Google, free software drivers where possible.
- Cons: weak hardware, poor performance, and often inadequate security hardening and update policies.
App distribution and F-Droid debate
- GrapheneOS ships a minimal first-party App Store and mirrors Accrescent and Google Play. Community often recommends Obtainium for fetching developer-signed releases.
- Some users dislike the “Russian doll” of multiple app sources and prefer a single F-Droid-style repository.
- Strong criticism of F-Droid appears: outdated infrastructure, security weaknesses, and rebuilding/signing apps themselves.
- Others defend F-Droid as a valuable, transparent intermediary that centralizes trust and tries to catch malicious changes, arguing this is safer than trusting “millions of developers” individually.