Mobile Operating System Comparison

From Kicksecure
Revision as of 04:57, 23 February 2022 by Nurmagoz (talk | contribs)
Jump to navigation Jump to search

Introduction

This mobile operating system comparison focused on either/and/or security, privacy, anonymity, source-available, Freedom Software, de-googled, un-googled mobile operating systems. Also other popular or frequently discussed operating systems might be added.

All statements are either false or incomplete.archive.org iconarchive.today icon

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Definitions

source-available - better term required

  • can be modified and redistributed
  • source available to public without registration
  • a legal condition preventing the usual blessing of capitalized Open Source, Free Software as blessed by stewards OSI, FSF or Debian DSFG licensesarchive.org iconarchive.today icon

iPhone and Android

Most iPhone / Android devices [1] "Libre Android" [2] Linux Desktop Distributions Kicksecure Development Goals
Upgrades do not require vendor No Yes Yes Yes
User freedom to replace operating system No Yes Yes Yes
Administrator capabilities (root) not refused No Yes Yes Yes
Custom operating system (bootloader unlock) not refused No Yes Yes Yes
No trouble or void device warranty from software changes (rooting or bootloader unlock) No [3] No [4] Yes Yes
No user freedom restrictions No [5] Yes Yes Yes
No backdoors included No [6] Yes Yes Yes
No spyware included in operating system No [7] Yes Yes Yes
No culture of freemium applications that spy on users in appstores No [8] Yes Yes Yes
Culture of Freedom Software in appstores No Yes Yes Yes
Freedom Software No [9] Yes Yes Yes
Compromised application cannot access data of other applications Yes [10] Yes [10] No Yes
Malware on a compromised system cannot easily gain root Yes [11] Yes [11] No [12] Yes
Reasonable resistance against system wide rootkit Yes [13] Yes [13] No Yes
Verified Boot Yes Yes No Yes
Hardened Kernelarchive.org iconarchive.today icon Yes Yes some Yes
Full System MAC Policyarchive.org iconarchive.today icon Yes Yes No Yes
Internal storage can reasonably easily be removed and mounted elsewhere for the purpose of data recovery or hunting malware / rootkits. No [14] No [4] Yes [15] Yes [16]
Internal storage can reasonably easily be decrypted once transferred to a different device if password is known. No [17] No [18] Yes Yes [19]
Can reasonably easily boot from external hard drive, ignoring internal harddrive for purpose of data recovery or hunting malware / rootkits. No No [4] Yes Yes [16]
Can reasonably easily create full data backup. No [20] Yes Yes Yes [16]
Can reasonably easily create full data backup of any app when device is rooted with Titanium Backup or similar No [21] Yes Yes Yes [16]
Applications cannot refuse data backup (for purpose of malware, spyware analysis or backup and restore). No [22] Yes Yes [23] Yes [16]
No culture of users can ask device (code) for permission and device (code) will decide to grant or refuse the request. No Yes Yes [23] Yes [16]
No culture of applications refusing to run if device is rooted. No [24] Yes Yes Yes [16]
No culture of applications refusing to run if using a custom operating system (custom ROM). No [25] Yes Yes Yes [16]
User (privacy) settings are respected. No [26] Yes Yes Yes [16]
WiFi off indicator means that WiFi is really off. No [27] Yes Yes Yes [16]
Bluetooth off indicator means that Bluetooth is really off. No [28] Yes Yes Yes [16]
Prevention of targeted malicious upgrades. [29] No [30] ? [31] ? [32] Yes [33]
Vendors do not sometimes introduce mitigations that introduce attack surface. No [34] Yes Yes Yes [16]
The GNU Project does not state: "Apple's Operating Systems Are Malwarearchive.org iconarchive.today icon" and "Google's Software is Malwarearchive.org iconarchive.today icon". No Yes Yes Yes [16]

Quote More than a billion hopelessly vulnerable Android gizmos in the wild that no longer receive security updates – researcharchive.org iconarchive.today icon. The operating system of these devices:

  • Do not receive security upgrades from the vendor.
  • Third parties (such as users or the modding community) cannot provide (security) upgrades either due to locked bootloaders, which cannot be unlocked due to vendor decision and due to unavailability of a security bug which could unlock the bootloader.
  • Even if bootloaders can be unlocked there might not be an adequate operating system upgrades available from third parties, such as the modding community. Either due to unpopularity of the devices among modding developers and/or due to technical challenges.

Ability to upgrade (security fixes) devices; replace operating system; bootloader freedom vs bootloader non-freedom:

  • iPhones and some Android devices have locked boot loaders that cannot be unlocked. This restricts user freedom and makes replacing the operating system impossible without a verified boot bypass exploit. In case the vendor deprecated security support for the device, the only choices users realistically have is to keep using an insecure device, or to buy a device which still has security support. Similarly, locked bootloaders also prevent gaining administrator (root) access.
  • Some Android devices do allow unlocking the bootloader but not with custom verified boot keys, causing a decrease in security.
  • Some Android devices (such as the Nexus or Pixel devices) support full verified boot with custom keys that can be used with alternative operating systems.

In conclusion, when using iPhone/Android devices that still receive security updates, the iPhone/Android approach provides strong protection against malware, meaning those platforms are impacted much less than Windows or Linux desktops. [10] Despite the many downsides (Mobile Devices Backdoors in Most Phones Tablets Etc, Data Harvesting by Most Phones, ...), the security model of popular mobile operating systems often affords better protection when attempting to prevent any malicious and unapproved party from establishing a foothold in their ecosystem. In the process, the user's and the security community's ability to audit and control what their devices are actually doing is severely diminished. Due to a Conflict of Interest this comes at the expense of transferring power from the user to the developers, user freedom restrictions, Tyrant Security, War on General Purpose Computing.

Android

This applies to almost all users of Android. [35]

  • Weak privacy policies: The Google privacy policyarchive.org iconarchive.today icon applies to all Google services and ecosystems. This includes the right to collect information such as: [36]
    • Personal information: Name, email address, and telephone number.
    • Device-specific information: Hardware model, operating system, unique device identifiers, mobile network information.
    • Log information: Search queries, telephony log information (phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls), IP address, browser-specific cookies, and device event information (crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL).
    • Location information: IP address, GPS, and other sensors providing information on nearby services such as Wi-Fi access points and cell towers. It was recently discoveredarchive.org iconarchive.today icon Google continues to track users even after they opt-out of Location History. [37]
    • Unique application numbers: Information on application types and version numbers.
    • Local storage: Storing personal information locally with local browser storage (like HTML5) and application data caches.

CalyxOS

  • Slogan: "Privacy by Design"
  • A project from the Calyx Institute, New York, a "non-profit education and research organization"
  • Free and Open Source Software -> https://gitlab.com/calyxosarchive.org iconarchive.today icon
  • Uses microG for implementing Google's proprietary services
  • Hardware: Google Pixel 2, Pixel 2 XL, Pixel 3, Pixel 3 XL, Pixel 3a, Pixel 3a XL
  • https://calyxos.orgarchive.org iconarchive.today icon

CopperheadOS

GrapheneOS

  • Hardened version of AOSP, with a strong focus on security and privacy. Currently only supported on Pixel devices.
  • By Daniel Micay (who previously worked on CopperheadOS).
  • Common ancestry with CopperheadOS.
  • https://grapheneos.orgarchive.org iconarchive.today icon
  • https://github.com/GrapheneOSarchive.org iconarchive.today icon
  • https://www.reddit.com/r/GrapheneOS/archive.org iconarchive.today icon
  • Freedom Software? -> https://github.com/GrapheneOS/os_issue_tracker/issues/109archive.org iconarchive.today icon
  • Prioritizes power of developers: Yes.
  • Prioritizes power of users: No.
  • Implements various changes to harden libc, the Linux kernel, and other OS components.
  • Includes Vanadium, a hardened and mostly de-Googled version of Chromium.
  • Allows users to disable network and sensor (accelerometer, etc.) access for apps.
  • Argues that allowing users to gain root (superuser) access would inevitably break the security model and that there is no conceivable solution that can uphold both user security and freedom.
  • Quote GrapheneOS lead developerarchive.org iconarchive.today icon:

    GrapheneOS is not aimed at power users or hobbyists aiming to tinker with their devices more than they can via the stock OS or AOSP.

  • Making efforts to allow users to gain root in a secure way: No.
  • Supports DRM (Digital Restrictions Managementarchive.org iconarchive.today icon) / walled garden / anti-freedom / Google SafetyNet where developers can configure their applications to only run on devices on certified firmware. [39]
    • Quote GrapheneOS lead developerarchive.org iconarchive.today icon:

      Users are free to avoid apps using attestation to implement DRM / anti-cheat.

    • More and more businesses communicate over proprietary messengers such as WhatsApp and WhatsApp cannot be used on rooted devices or with custom ROMs. [40]
    • More and more government services require the same. For example, an Android or iPhone with Google maps location history enabled and Skype is mandatory for entering Japan. [41] Google maps is produced by Google and Skype produced by Microsoft are among the worst privacy-intrusive companies.
    • Many people would loose their job if they decided not to use for example WhatsApp since many companies internally use WhatsApp.
    • Three are still 2 billion unbanked people. [42] People who do not even have access to the most basic financial services such as a bank account. For unbanked people it would be unreasonable and should not be expected of them to refuse their first chance to use a mobile banking app with such restrictions.
    • In conclusion, the recommendation to simply not use such applications is impractical and counter the lived reality of many people.
    • Potential Conflict of Interest. If GrapheneOS wouldn't disable easy to use technical ways that most laymen users can use to gain root and/or to keep control over the software running on their devices, then GrapheneOS's chances to be ever get a highly profitable hardware producer partnership would be severely diminished.
  • Full verified boot which would be great if the key would be held by users and encouraged through a first start process or similar instead of held by the developer.

Eelo

Fairphone

Librem 5

LineageOS

  • Previously called Cyanogenmod
  • No google services installed by default (good for privacy and security).
  • Google services can be optionally installed as an add-on
  • Hardware: after market firmware for loads of devices, including Fairphone and OnePlus
  • https://lineageos.orgarchive.org iconarchive.today icon

Neo900

  • Reanimated
  • Open platform (OpenPhoenux GTA04) in tradition of Openmoko
  • Hardware: Neo900
  • https://neo900.orgarchive.org iconarchive.today icon

OnePlus

  • Not all Freedom Software by default but software modifications permitted
    • Hardware that grants users the "right to flash"
    • (Root and custom ROM allowed without voiding warranty)
  • Hardware: OnePlus 3, 3T, 5, 5T (current models)
  • https://oneplus.netarchive.org iconarchive.today icon

Openmoko

PinePhone

PiTalk

Plasma Mobile

  • By KDE
  • Not security focused at all at this stage?
  • Builds based on Kubuntu and Archlinux
  • Hardware: Google Nexus 5, 5X
  • https://plasma-mobile.orgarchive.org iconarchive.today icon

PostmarketOS

  • Very early stage of development
  • Linux distro (based on Alpine Linux) on the phone
  • Hardware: many devices, including Google Nexus models and Fairphone 2
  • https://postmarketos.orgarchive.org iconarchive.today icon

Replicant

Ubuntu Touch

Quick Mentions

Hardware Kill Switches

No phone has a speaker yet that can be disabled but this is just as important as speakers can be turned into microphones. That is because a speaker is technically quite similar to microphones. See SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profitarchive.org iconarchive.today icon.

Next best option is to have a phone that at least has a removable battery to make it's sometimes really powered off and not secretly spying.

Related

Forum Discussion

https://forums.whonix.org/t/overview-of-libre-software-related-mobile-projectsarchive.org iconarchive.today icon

See Also

Footnotes

  1. Most iPhone / Android phones that are sold by mobile carriers or manufacturers have locked bootloaders. These phones are often packaged with spyware installed by default, which cannot be removed. There may be rare exceptions to this rule, hence "most" and not "all". These exceptions are not the point which shall be made in this comparison. See the "Libre Android" column for what is theoretically possible.
  2. There is no "Libre Android" at time of writing. It's only a concept to illustrate a point. There is no "perfect" Android distribution. GrapheneOS has verified boot but root access is refused in default buildsarchive.today icon. Replicant allows root access, but no references were found that Replicant makes use of verified boot yet. It's not relevant to pick any specific Android distribution for the sake of making the point "iPhone and Android Level Security for Linux Desktop Distributions" no specific Android distribution was chosen for this compassion. A "perfect" Android distribution checking all "green yes" is possible in theory. It doesn't exist due to policy decisions. (GrapheneOS vs root in default builds vs device selection / features.) There are no technical reasons for non-existence. See also this Overview of Mobile Projects, that focus on either/and/or security, privacy, anonymity, source-available, Freedom Software..
  3. https://www.howtogeek.com/240417/does-rooting-or-unlocking-void-your-android-phones-warranty/archive.org iconarchive.today icon
  4. 4.0 4.1 4.2 Same issue as Most iPhone / Android devices since inheriting the same hardware limitations.
  5. Mobile Devices Restrictions
  6. Mobile Devices Backdoors in Most Phones Tablets Etc
  7. Data Harvesting by Most Phones
  8. Data Harvesting by Most Apps
  9. Comes with a lot proprietary software installed by default.
  10. 10.0 10.1 10.2 That would require an exploit. In comparison, a compromised application on the Linux desktop running under user has full access to all information which that user has access to, including all files, keystrokes and so on. The exception is when mandatory access control (MAC)archive.org iconarchive.today icon is in use and successfully confines that application.
  11. 11.0 11.1 Occasionally there are exploits that allow applications to gain root, but as time passes more of these vulnerabilities are being fixed.
  12. On the Linux desktop the process of Preventing malware from Sniffing the Root Password is cumbersome and unpopular. Therefore any compromised application on the Linux desktop could lead to root compromise. This in turn might compromise the bootloader, kernel, or even hardware. It is difficult to detect malware, remove a rootkitarchive.org iconarchive.today icon and indicators of compromise are rare.
  13. 13.0 13.1 Through verified boot.
  14. Computer (non-mobile) hardware is much more flexible. Storage devices can be removed from a computer, then added to another computer as a secondary disk. When booting from an installation assumed to be uncompromised (by [the same] malware), a search for malware can be performed on the other disk without executing any code, reducing risk of infection for the booted disk. This kind of procedure can be performed reasonably easily by most repair shops, and even non-technical people can do this without the need for soldering.
  15. 16.00 16.01 16.02 16.03 16.04 16.05 16.06 16.07 16.08 16.09 16.10 16.11 16.12 Same as Linux Desktop Distributions.
  16. Limitations on Encryption Key Backups
  17. Same issue as Most iPhone / Android devices. Limitation of hardware, not software.
  18. Same as Linux Desktop Distributions.
  19. See next point below.
  20. Signal messenger apparchive.org iconarchive.today icon is such an example. People expected Titanium Backuparchive.org iconarchive.today icon to be able to backup the Signal app data but lost dataarchive.org iconarchive.today icon. Extra steps are required for a Signal backup.archive.org iconarchive.today icon (Instructions untested by author of this wiki page.)
  21. Quote https://developer.android.com/guide/topics/manifest/application-element#allowbackuparchive.org iconarchive.today icon android:allowBackup

    Whether to allow the application to participate in the backup and restore infrastructure. If this attribute is set to false, no backup or restore of the application will ever be performed, even by a full-system backup that would otherwise cause all application data to be saved via adb. The default value of this attribute is true.

  22. 23.0 23.1 If credentials can be provided (full disk encryption password if used), (super) root will have full access.
  23. How to prevent applications from discovering my phone as being Rootedarchive.org iconarchive.today icon
  24. How-To Geek: SafetyNet Explained: Why Android Pay and Other Apps Don’t Work on Rooted Devicesarchive.org iconarchive.today icon
  25. AP Exclusive: Google tracks your movements, like it or notarchive.org iconarchive.today icon

    Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.

    An Associated Press investigation found that many Google services on Android devices and iPhones store your location data even if you’ve used a privacy setting that says it will prevent Google from doing so.

    Computer-science researchers at Princeton confirmed these findings at the AP’s request.

  26. How it works, according to Google, is that the Android Location Services periodically checks on your location using GPS, Cell-ID, and Wi-Fi to locate your device. When it does this, your Android phone will send back publicly broadcast Wi-Fi access points' Service set identifier (SSID) and Media Access Control (MAC) data. Again, this isn't just how Google does it; it's how everyone does it. It's Industry practice for location database vendors.

  27. Google can still use Bluetooth to track your Android phone when Bluetooth is turned offarchive.org iconarchive.today icon
  28. As in singling out specific users. Shipping malicious upgrades to select users only.
  29. Vulnerability to Target Malicious Upgrades
  30. Probably same as Linux Desktop Distributions.
  31. Linux distributions usually do not require an e-mail based login to receive upgrades. Users can still be singled out by IP addresses unless users opt-in for using something such as apt-transport-tor which is not the default.
  32. All upgrades are downloaded over Tor. There is no way for the server to ship legit upgrade packages to most users while singling out specific users for targeted attacks.
  33. Some Android vendors introduce mitigations that introduce attack surfacearchive.org iconarchive.today icon.
  34. Except to the few users using after market firmwares that resist flashing google play services. https://www.androidpit.com/android-without-google-appsarchive.org iconarchive.today icon
  35. Google's insistence on real-name policies for Gmail and Youtube accounts, along with strict measures to prevent signing up via Tor, have significantly contributed to user profiling. Google has also dropped its ban on personally-identifiable information in advertisement services.
  36. Meaning Google applications continue to store time-stamped location data without user input.
  37. https://copperhead.co/android/downloadsarchive.org iconarchive.today icon

    CopperheadOS source code for all devices are made available to the public under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license, along with some portions that are GPL2 (kernel) or GPL3 (F-Droid).

    Devices purchased from our store come with a per-device commercial license for the official builds.

    Contact sales@copperhead.co for obtaining commercial licensing for the source code, bulk sales of devices or custom development work. Funding the public release of CopperheadOS sources under more permissive licensing is also an option.

    • Quote https://grapheneos.org/usage#sandboxed-play-servicesarchive.org iconarchive.today icon

      The hardware attestation feature is part of the Android Open Source Project and is fully supported by GrapheneOS. SafetyNet attestation chooses to use it to enforce using Google certified operating systems. However, app developers can use it directly and permit other properly signed operating systems upholding the security model. GrapheneOS has a detailed guidearchive.org iconarchive.today icon for app developers on how to support GrapheneOS with the hardware attestation API. Direct use of the hardware attestation API provides much higher assurance than using SafetyNet so these apps have nothing to lose by using a more meaningful API and supporting a more secure OS.

    • https://grapheneos.org/articles/attestation-compatibility-guidearchive.org iconarchive.today icon
  38. https://faq.whatsapp.com/android/download-and-installation/about-rooted-phones-and-custom-roms/?lang=enarchive.org iconarchive.today icon
  39. https://www.businessinsider.com/the-worlds-unbanked-population-in-6-charts-2017-8archive.org iconarchive.today icon
Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!