diff --git a/about.html b/about.html index 9b4a4f7..7b386cd 100644 --- a/about.html +++ b/about.html @@ -35,6 +35,62 @@ being affected.
Type | +Hardware | +Description | +Source model + + (License) |
+
Smartphone | +![]() + + Google Pixel 6 |
+ Google Pixel devices are the best Android devices available on
+ the market for security and privacy. + + They allow locking the bootloader with a custom Android Verified Boot (AVB) + key in order to preserve security and privacy features when installing a custom + operating system, such as verified boot which verifies that the OS has not been + corrupted or tampered with, and rollback protection which prevents an adversary + from rolling back the OS or firmware version to a previous version with known + security vulnerabilities. + + They also include a hardware security module (Titan M2) which is extremely resistant + to both remote and physical attacks due to being completely isolated from + the rest of the system, including the operating system. Titan M2 ensures that + the device cannot be remotely compromised by requiring the side buttons of the + device to be physically pressed for some sensitive operations. Titan M2 also + takes the role of Android Strongbox keystore, containing sensitive user keys which + are unavailable to the OS or apps running on it without authorisation from Titan M2 + itself. Insider attack resistance ensures that Titan M2 firmware can be flashed only + if the user PIN/password is already known, making it impossible to backdoor the device + without already knowing these secrets. + + Google Pixel device kernels are compiled with fine-grained, forward-edge control-flow + integrity and backward-edge control-flow integrity to prevent code reuse attacks against + the kernel. MAC address randomisation is implemented well, with minimal probe requests + and randomised initial sequence numbers. + + Google releases guaranteed monthly security updates, ensuring Google Pixel devices are + up-to-date and quickly protected against security vulnerabilities. + + Pixel 6-series devices are a large improvement over the already very secure and private + previous generation Pixel devices. They replace ARM-based Titan M with RISC-V-based Titan M2, + reducing trust by removing ARM from the equation. Titan M2 is more resiliant to attacks than + Titan M, and is AVA_VAN.5 certified, the highest level of vulnerability assessment. Google's + in-house Tensor SoC includes Tensor Security Core, further improving device security. + Pixel 6-series devices are supported for a minimum of 5 years from launch, an increase from + previous generations' support lifecycles of 3 years. |
+
Software | Description | Source model + (License) |
Open source @@ -133,10 +191,10 @@ Vanadium |
Vanadium is a security-hardened, privacy-hardened Chromium-based web browser
which utilises GrapheneOS' operating system hardening to implement stronger
- defenses to the already very secure Chromium web browser. Its hardening includes
- disabling JavaScript just-in-time (JIT) compilation by default, stubbing out the
- battery status API to prevent abuse of it, and always-on
- Incognito mode as an option. + defenses to the already very secure Chromium web browser. Its hardening alongside + Chromium's base security features includes disabling JavaScript just-in-time (JIT) + compilation by default, stubbing out the battery status API to prevent abuse of it, + and always-on Incognito mode as an option. Vanadium's source code repository, including its Chromium patchset, can be found here. |
diff --git a/img/google-pixel_6.png b/img/google-pixel_6.png
new file mode 100644
index 0000000..355ee8e
Binary files /dev/null and b/img/google-pixel_6.png differ