Show more

@IzzyOnDroid I'm not sure the point you're trying to make here. EU Horizon grants such as Mobifree are large partnerships between around 10 projects. The work and goals are all nailed down between the partners. These kinds of funds are not free money to spend as we please.

@IzzyOnDroid indeed AllowedAPKSigningKeys was inspired by the various custom scripts and processes we had in place already. We welcome contributions to improve AllowedAPKSigningKeys. We don't currently have funding to work on it. We would gladly help someone put together a funding proposal to work on it.

@IzzyOnDroid I understand your concern. From what I know, the IzzySoft repo relies much more on AllowedAPKSigningKeys to provide a secure repo than f-droid.org or guardianproject.info (the repos I'm involved in running). Both had extra verification before AllowedAPKSigningKeys existed, so there, its just an extra layer of protection. The goal of AllowedAPKSigningKeys is to make it easy for non-technical people to manage binary APK repos securely. That is a work in progress, and your reports help

@IzzyOnDroid the regex fix is a good one, we'll look into merging that. I'd need to see a v2-signed APK that is installable on Android that demonstrates the exploit it in order to consider this an actionable security vulnerability. APKs signed by v1-only are not even installable on latest Android versions, and Android 7.0 and above support v2+ signatures. Looks like obfusk's proof of concept is a v1-only APK. Do you even ship v1-only APKs in IzzySoft anymore?

@Fr333k one has to do everything to survive the dark, cold, deeply foggy winter! So why not embrace the dark!

@captainepoch @cnx @fdroidorg @husky hehe you're welcome. That's perfect! If we focus on fixing things upstream as much as possible, many apps will just automatically become without the devs even being aware. Your message made me feel like we're on the right track, thanks!

@IzzyOnDroid @S1m @fdroidorg @SylvieLorxu The issue you are pointing to is only for APKs that have APKv1 signatures. That means apps with minSdkVersion less than 24 (Android 6 and older). That is devices that have not had an OS update since 2015. That is maybe a couple of percent of Android users? So I decided my limited time was better spent elsewhere rather than sinking days of work to supporting a small percentage of apps on a tiny percentage of devices. That said, I welcome contributions.

@obfusk @fdroidorg @IzzyOnDroid I agree it is important to mention when there are patches, and the build environment is also often relevant. We use a minimal Debian/stable build environment both in CI containers and in production VMs to provide as neutral a build environment as possible. Plus we also like that is the most reproducible base OS that is currently feasible to use for Android builds.

@cnx @fdroidorg @captainepoch @husky All our rebuilds of Husky from v1.4.0 til v1.5.3 have been reproducible, so most likely, the newer ones still are. We'll see for sure once our rebuilders catch up with the backlog.

@AAMfP @fdroidorg It looks our current rebuild hasn't reached your latest releases yet. Based on the output from v6.8.0, it looks like an issue from the tooling itself that is likely fixed in newer versions. I don't recognize the specific issue, perhaps someone else does? I'll try to bump up the priority of rebuilding your latest release.

verification.f-droid.org/name.

@SylvieLorxu @fdroidorg @IzzyOnDroid I totally agree that people should only file useful issues based on concrete solutions. Most of the issues we are seeing in our mass rebuilds are the classic timestamps and sort order issues. These are generally easy to spot in the output we are providing. For fixing timestamps, I recommend reproducible-builds.org/docs/s For sort order issues, usually the dev has to just add sorting to the code, like codeberg.org/iNPUTmice/Convers

@IzzyOnDroid @S1m @fdroidorg @SylvieLorxu we aim to support signer key rotation. We would greatly appreciate it if those who know about bugs would file them in our issue tracker so that we can track them. Also, we welcome contributions there.

@IzzyOnDroid @fdroidorg @SylvieLorxu I would be happy to see your repo become ! As you well know, F-Droid only endorses verifiable free software projects.

It is also great to see all your work on . We are continuing to build upon our years of effort there. Our approach is focused on identifying issues and getting things fixed upstream as much as possible. Then devs do not need to use any special tools to achieve reproducible builds.

@voxel @fdroidorg It is now. v1.20.0 and newer are all reproducible, for example: verification.f-droid.org/org.f

The "failed" page only shows failures since we are highlighting those to fix them. Check the JSON API for the full history, e.g. verification.f-droid.org/org.f

We're starting a sprint to look at all the issues preventing #ReproducibleBuilds in all the apps we ship. Most of the issues are simple fixes in the upstream code, like unsorted outputs or timestamps included in the build.
You can help make the #FreeSoftware #Android ecosystem be more reproducible! See the failures here and help us report them upstream: verification.f-droid.org/faile

@D22 @fdroidorg It will download the F-Droid.apk, and if a device is available via adb, it will try to install it using adb. We have some other ideas how to help the user get the APK installed from the desktop, we are also open to ideas and suggestions.

We wrote a blog post about trust and how to have a verified installation of our client.

One such source for the client could be our CLI tool, that recently got the ability to download the F-Droid.apk.

Read more at
f-droid.org/2024/12/11/verifie

@hyakinthos @zacchiro The Tor Project is not a good candidate, they have actually been trying to lessen their involvement in browser work for a while. It is difficult and resource intensive. It does help that is now contributing. More orgs and devs should join in!

This week in #FDroid (TWIF):

- european-alternatives.eu lists software and apps that come from the EU, some of them are regular guests in our TWIF
- we found a YouTube video about apps that are NOT on a centralized app store
- aTox and UniPatcher were updated again after a long hiatus
- Kodi fixed many bugs
- OsmAnd~ has a lot of new features
- Status, VLC and Zulip were also updated (and 111 more apps)
- MRT Buffy is new and helps you commute in Dhaka

Read more at f-droid.org/2024/11/21/twif.ht

This is the example of the kind of feature that the is driving to implement. It could have been implemented long ago, but there was no pressure for Google to do so. Notice how they implemented it in , not Android. Apps that implement this are then tied to Google's proprietary stuff. That's their way of maintaining control of the ecosystem. theverge.com/2024/11/21/243025

Show more
image/svg+xml Librem Chat image/svg+xml