Daniel Micay
Daniel Micay
> There is no way to disable the ptrace blocking on stock GrapheneOS GrapheneOS doesn't restrict access to ptrace by default and never uses ptrace scoping. There's an optional security...
Only users who have explicitly disabled ptrace (which is referred to as native debugging in the UI) have it disabled. The setting exists for reducing kernel attack surface. We have...
Some US carriers require carrier apps we aren't including.
Is this resolved on the latest release?
Needs to be added back.
Yes, but we'd probably only support FIDO2 rather than legacy TOTP.
Simply using a long random passphrase via a password manager makes TOTP quite pointless. There's also no account recovery for this service for security reasons.