Next #GrapheneOS update now includes some hardening against reset attacks to prevent potential ways of bypassing our memory zeroing features.
This is a response to the exploit we previously reported to Google of forensics companies exploiting a RAM dump from fastboot firmware to brute force OS credentials in Pixels running the stock OS. While not suggested to affect GrapheneOS nor should a user be concerned, this will be an additional security enhancement for our users anyways.
Thermal reboots are unsafe reboots that don't erase memory safely. They have now been changed to perform safe shutdowns instead. It stops a threat with physical access and RAM dump capabilities from overheating the phone to force an unsafe reboot into fastboot. A reset attack protection mechanism has been enabled for supported UEFI systems. While we don't support devices using UEFI or the UEFI reset attack protection mechanism, it could come useful in later devices.
These protections will be one of multiple to kill the capability for good.
Read about the original exploit on my post on stacker news: 
Stacker News
GrapheneOS discloses vulnerabilities actively exploited by forensic companies \ stacker news
Link: https://x.com/GrapheneOS/status/1745506661467299946 Nitter: https://nitter.net/GrapheneOS/status/1745506661467299946?s=20 Overview The team a...