logoalt Hacker News

strcatyesterday at 7:53 PM2 repliesview on HN

> You seem knowledgeable about this, so I'll take the opportunity to ask: if I install a malicious app and it manages to escape the sandbox and alter the system, my understanding is that it will be detected next time I boot it (because the image hash won't match). Isn't that true?

They're misrepresenting what has been said by GrapheneOS and also lack a good understanding of it themselves. They're definitely not a good source of information about this.


Replies

palatayesterday at 10:06 PM

Could you provide some insights there? That would be appreciated.

1. Is it correct that the secure boot protects again a malicious app escaping the sandbox and persisting into the system?

2. Is it correct that if the system is signed with the Google testing keys, then someone could sign an app with those keys and the app would get more permissions than it should (I believe it's called the "signature" permissions)?