226
16
submitted 1 year ago by baatliwala@lemmy.world to c/googlepixel
227
29
submitted 1 year ago by nimnim@lemmy.ca to c/googlepixel

cross-posted from: https://lemmy.ca/post/2850106

cross-posted from: https://lemmy.ca/post/2850076

August Google Pixel update bug fixes:

Bluetooth

  • Fix for issue occasionally causing Bluetooth keyboards to not connect *[Pixel Fold, Tablet]

User Interface

  • Fix for issue causing certain Live Wallpapers to display incorrectly in different device orientations *[Pixel Fold]
  • Fix for issue occasionally causing lock screen to not respond *[Pixel Fold]
  • Fix for issue occasionally causing home screen launcher search input to not register *[Pixel Fold]
  • Fix for issue occasionally causing flickering or glitches while in Hub Mode *[Pixel Tablet]

August Google Pixel update builds:

Global

  • Pixel 4a: TQ3A.230805.001
  • Pixel 4a (5G): TQ3A.230805.001
  • Pixel 5: TQ3A.230805.001
  • Pixel 5a (5G): TQ3A.230805.001
  • Pixel 6: TQ3A.230805.001
  • Pixel 6 Pro: TQ3A.230805.001
  • Pixel 6a: TQ3A.230805.001
  • Pixel 7: TQ3A.230805.001
  • Pixel 7 Pro: TQ3A.230805.001
  • Pixel 7a: TQ3A.230805.001
  • Pixel Tablet: TQ3A.230805.001.B1
  • Pixel Fold: TQ3C.230805.001.A3
  • Pixel Watch: RWDC.230805.001

Japan

  • Pixel Fold: TQ3C.230805.001.A4

T-Mobile & MVNOs, Google Fi (US)

  • Pixel 6: TQ3A.230805.001.A1
  • Pixel 6 Pro: TQ3A.230805.001.A1
  • Pixel 6a: TQ3A.230805.001.A1

Verizon & MVNOs (US)

  • Pixel 4a: TQ3A.230805.001.A2
  • Pixel 4a (5G): TQ3A.230805.001.A2
  • Pixel 5: TQ3A.230805.001.A2
  • Pixel 5a (5G): TQ3A.230805.001.A2
  • Pixel 6: TQ3A.230805.001.A2
  • Pixel 6 Pro: TQ3A.230805.001.A2
  • Pixel 6a: TQ3A.230805.001.A2
  • Pixel 7: TQ3A.230805.001.A2
  • Pixel 7 Pro: TQ3A.230805.001.A2
  • Pixel 7a: TQ3A.230805.001.A3
  • Pixel Fold: TQ3C.230805.001.B2
228
10
submitted 1 year ago by baatliwala@lemmy.world to c/googlepixel
229
11
submitted 1 year ago by ijeff to c/googlepixel

August 4, 2023

Jay Hou, Software Engineer, TrustFabric (transparency.dev) 

Pixel Binary Transparency

With Android powering billions of devices, we've long put security first. There's the more visible security features you might interact with regularly, like spam and phishing protection, as well as less obvious integrated security features, like daily scans for malware. For example, Android Verified Boot strives to ensure all executed code comes from a trusted source, rather than from an attacker or corruption. And with attacks on software and mobile devices constantly evolving, we're continually strengthening these features and adding transparency into how Google protects users. This blog post peeks under the hood of Pixel Binary Transparency, a recent addition to Pixel security that puts you in control of checking if your Pixel is running a trusted installation of its operating system. 

Supply Chain Attacks & Binary Transparency

Pixel Binary Transparency responds to a new wave of attacks targeting the software supply chain---that is, attacks on software while in transit to users. These attacks are on the rise in recent years, likely in part because of the enormous impact they can have. In recent years, tens of thousands of software users from Fortune 500 companies to branches of the US government have been affected by supply chain attacks that targeted the systems that create software to install a backdoor into the code, allowing attackers to access and steal customer data.

One way Google protects against these types of attacks is by auditing Pixel phone  firmware (also called "factory images") before release, during which the software is thoroughly checked for backdoors. Upon boot, Android Verified Boot runs a check on your device to be sure that it's still running the audited code that was officially released by Google. Pixel Binary Transparency now expands on that function, allowing you to personally confirm that the image running on your device is the official factory image---meaning that attackers haven't inserted themselves somewhere in the source code, build process, or release aspects of the software supply chain. Additionally, this means that even if a signing key were compromised, binary transparency would flag the unofficially signed images, deterring attackers by making their compromises more detectable.

How it works

Pixel Binary Transparency is a public, cryptographic log that records metadata about official factory images. With this log, Pixel users can mathematically prove that their Pixels are running factory images that match what Google released and haven't been tampered with.

The Pixel Binary Transparency log is cryptographically guaranteed to be append-only, which means entries can be added to the log, but never changed or deleted. Being append-only provides resilience against attacks on Pixel images as attackers know that it's more difficult to insert malicious code without being caught, since an image that's been altered will no longer match the metadata Google added to the log. There's no way to change the information in the log to match the tampered version of the software without detection (Ideally the metadata represents the entirety of the software, but it cannot attest to integrity of the build and release processes.)

For those who want to understand more about how this works, the Pixel Binary Transparency log is append-only thanks to a data structure called a Merkle tree, which is also used in blockchain, Git, Bittorrent, and certain NoSQL databases. The append-only property is derived from the single root hash of the Merkle tree---the top level cryptographic value in the tree. The root hash is computed by hashing each leaf node containing data (for example, metadata that confirms the security of your Pixel's software), and recursively hashing intermediate nodes. 

The root hash of a Merkle tree should not change, if and only if, the leaf nodes do not change. By keeping track of the most recent root hash, you also keep track of all the previous leaves. You can read more about the details in the Pixel Binary Transparency documentation

Merkle Trees Proofs

There are two important computations that can be performed on a Merkle tree: the consistency proof and inclusion proof. These two proofs together allow you to check whether an entry is included in a transparency log and to trust that the log has not been tampered with.

Before you trust the contents of the log, you should use the consistency proof to check the integrity of the append-only property of the tree. The consistency proof is a set of hashes that show when the tree grows, the root hash only changes from the addition of new entries and not because previous entries were modified.

Once you have established that the tree has not been tampered with, you can use the inclusion proof to check whether a particular entry is in the tree. In the case of Pixel Binary Transparency, you can check that a certain version of firmware is published in the log (and thus, an official image released by Google) before trusting it.

You can learn more about Merkle trees on Google's transparency.dev site, which goes deeper into the same concepts in the context of our Trillian transparency log implementation.

Try It Out

Most Pixel owners won't ever need to perform the consistency and inclusion proofs to check their Pixel's image---Android Verified Boot already has multiple safeguards in place, including verifying the hash of the code and data contents and checking the validity of the cryptographic signature. However, we've made the process available to anyone who wants to check themselves---the Pixel Binary Transparency Log Technical Detail Page will walk you through extracting the metadata from your phone and then running the inclusion and consistency proofs to compare against the log.

More Security to Come

The first iteration of Pixel Binary Transparency lays the groundwork for more security checks. For example, building on Pixel Binary Transparency, it will be possible to make even more security data transparent for users, allowing proactive assurance for a device's other executed code beyond its factory image. We look forward to building further on Pixel Binary Transparency and continually increasing resilience against software supply chain attacks.

230
4
submitted 1 year ago by ijeff to c/googlepixel

cross-posted from: https://lemdro.id/post/349384

That's nice. I hope I get in my small town.

231
11
submitted 1 year ago* (last edited 1 year ago) by ijeff to c/googlepixel
232
7
submitted 1 year ago by yesterdayshero@lemmy.world to c/googlepixel
233
15
submitted 1 year ago by ijeff to c/googlepixel

234
5
submitted 1 year ago by yesterdayshero@lemmy.world to c/googlepixel

Was really hoping battery life is improved, but that's not looking too likely...

235
13
submitted 1 year ago by ijeff to c/googlepixel

r/GooglePixel • u/osb103

PSA: Update Carrier Services if your pixel is suddenly crashing & can't access Chrome or most apps.

Update should be waiting in the play store & then just clear cache/data of android system WebView and then restart your device. And you should be good. No need for factory reset.

236
13
submitted 1 year ago by baatliwala@lemmy.world to c/googlepixel
  • 6.7" QHD+ LTPO OLED, 120Hz
  • Google Tensor G3 + Titan chip
  • 12GB RAM
  • 128/256GB storage
  • Camera: 50MP (OIS) + 64MP UW + 48MP (Tele)
  • Selfie: 11MP
  • Temperature sensor, Ultrasonic FP
  • Android 14
  • 4,950mAh battery, 27W wired charging
237
6
submitted 1 year ago by Welp_im_damned to c/googlepixel

Imo the pixel a series has been Google's strong suite with its value to feature ratio. Compared to their flagship where it feels empty almost.

238
7
submitted 1 year ago by Hansoloz@lemmy.world to c/googlepixel
239
6
submitted 1 year ago by Welp_im_damned to c/googlepixel

tdlr: the leather is thinner than dbrands leather skin.

240
10
submitted 1 year ago by ijeff to c/googlepixel
241
17
submitted 1 year ago* (last edited 1 year ago) by ijeff to c/googlepixel

Twitter screenshot

242
7
submitted 1 year ago by ijeff to c/googlepixel
243
11
Android 14 Beta 4 - Android Developers Blog (android-developers.googleblog.com)
submitted 1 year ago by ijeff to c/googlepixel
244
14
submitted 1 year ago by funchords@lemmy.sdf.org to c/googlepixel

I hung on to the Pixel 3 for a very long time because I was very turned off by the thought of carrying any larger of a phone. There simply was nothing on the current market smaller or the same size as the Pixel 3.

After I simply had no choice, I did it. I'm pleased to report that the 6a does a good job as a replacement for the 3.

It is a little bigger by every dimension:

  • Pixel 3: 5.73 x 2.69 x 0.31 inches (145.6 x 68.2 x 7.9 mm)
  • Pixel 6a: 5.99 x 2.83 x 0.35 inches (152.2 x 71.8 x 8.9mm)

The pocket feel is the same and I'm quickly used to it. The battery life is amazing compared to the Pixel 3 (2915 mAh vs 4410 mAh).

One of the best things, though, was the upgrade path was so easy. Within the hour, everything was synced and in their right places on my screen. There were only a few "Save to Home Screen" Firefox browser shortcuts that I had to recreate.

I'm hoping to have this another 2-3 years when I'll buy another Pixel, again hoping for one that is small and comfortable in my pocket.

Google Pixel

1414 readers
1 users here now

The home of /r/GooglePixel on Lemmy and the Fediverse!

The place for everything related to Google Pixel devices, including news, reviews, tips, tutorials, rooting, and app discussions.

!googlepixel@lemdro.id

Rules

  1. Stay on topic: all posts should be related to Google Pixel devices.
  2. No offensive/low-effort content: avoid posting offensive or low-effort content that does not contribute positively to the community.
  3. No self-promotional spam: active community members are welcome to post their apps but should also participate in comments and discussions. Please do not post links to your own website, YouTube channel, or blog.
  4. No reposts/rehosted content: whenever possible, submit original sources. If the original source is not available in English, you may provide a translation. Reposts of the same content are not allowed.
  5. No editorializing titles: when submitting articles, do not change the titles. You may add the author's name if it is relevant.
  6. No piracy: sharing or discussing pirated content is strictly prohibited.
  7. No unauthorized polls/bots/giveaways: please do not create unauthorized polls, use bots, or organize giveaways without proper authorization.
  8. No affiliate links: posting affiliate links is not allowed.

founded 1 year ago
MODERATORS