On the FBI and France framing GrapheneOS
I came across an interesting series of posts by the official GrapheneOS account on X on November 21st 2025 that we can all learn a lot from if we think about it. Here’s a quote:
Please listen to this podcast about ANOM:
The FBI ran a sting operation in Europe where they created their own ‘secure’ phone and messaging platform. Their OS used portions of our code and was heavily marketed as being GrapheneOS or based on GrapheneOS.
Through this operation, the FBI provided criminals in Europe with a communication network they heavily trusted. It gave them much more confidence to coordinate and commit crimes. The vast majority of this crime was ignored for years to avoid exposing ANOM as being a honey pot.
In cooperation with many European governments, the FBI heavily encouraged and facilitated organized crime in Europe. US and European governments facilitated drug trafficking, human trafficking, murders, rape, kidnapping and much more for years while claiming it was GrapheneOS.
It’s an outrageous infringement on the GrapheneOS copyright and trademarks. US and European governments did massive harm to the GrapheneOS project through doing this. They placed us in very real danger of violence from organized crime by selling fake GrapheneOS devices to them.
GrapheneOS building technology to protect privacy and security is completely legal. Our work is strongly protected by Canadian, European and American laws. A minuscule portion of our userbase are criminals and the claims being made by the French government about that are lies.
It’s very likely a lot of the crime facilitated by ANOM wouldn’t have happened without these governments providing criminals with a communications network they believed was completely secure. The way they wrapped it up doesn’t absolve them of what they facilitated for years.
France’s government and law enforcement wants you to believe GrapheneOS and Signal are somehow responsible for crime. French law enforcement operates with impunity and has extraordinarily levels of corruption and criminal behavior. They’re the ones committing and enabling crime.
Intelligence agencies creating honey pots like this by promoting and selling supposedly “secure communications” platforms and devices happens a lot.
The NSA and CIA for example have also done this in the past:
The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers. The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some “SIGINT tradecraft … is very hands-on (literally!)”.
Eventually, the implanted device connects back to the NSA. The report continues: “In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network.” “Glenn Greenwald: how the NSA tampers with US-made internet routers”, The Guardian (May 12th 2014)
And here’s more:
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret. The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software. The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.
But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages. “How the CIA used Crypto AG encryption devices to spy on countries for decades”, The Washington Post (February 11th 2020)
Also see “A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data” (February 21st 2016) for more examples. And let’s not forget the Mossad in Israhell, who’re also in the business of rigging communications devices, sometimes with deadly outcomes. 1
There are some very important lessons to learn from this:
- When you buy a device, first make sure the device itself does not contain some kind of backdoor in hardware. This can be very difficult to guarantee. It seems that apart from intelligence agencies setting up their own companies to sell supposedly ‘secure’ hardware, these agencies also infiltrate existing hardware companies that are part of the supply chain, by planting employees there who slip in backdoors in the design process. Or they might even make secret deals with existing hardware companies. Think of the ‘Triangulation’ backdoor discovered in iPhones in 2023 for example. 2
- Make sure you can completely remove the installed software and install or flash your own trusted version of software on the device. This includes the firmware, BIOS and operating system (OS). For example, if a phone comes preinstalled with GrapheneOS, the very first thing you should do when you buy such a phone is completely wipe it clean and flash your own verified and trusted version of GrapheneOS onto the phone. Preferably the latest version obtained from a verified official repository. Even better if you can compile and build it yourself from source. Another example is when you buy a router that comes preinstalled with OpenWRT; there you should also flash OpenWRT obtained from a trusted repository onto the device, instead of using what comes preinstalled. The same can also be said about a tablet or laptop that comes preinstalled with Windows or Linux. You get the idea now, I hope.
- Make use of anti-interdiction services when available. Purism is one company I know of that offers such services. When you buy a device, anti-interdiction services ensures that any tampering within the delivery process is much more easily recognizable.
- Completely wipe and reinstall the software on your devices regularly, preferably weekly or monthly. This requires using your devices in such a way where your data is easily backed up and restorable or is saved on a separate storage device to make it more convenient and easier to wipe your device frequently.
- Reboot your devices regularly, preferably daily. This can be done automatically; for example, I know that on Android devices, you can schedule daily reboots in the settings at specific times. Some exploits are not persistent (only stay active in RAM) and a reboot gets rid of them.
- It’s probably a good idea to keep browsing and communications applications that often receive data from outside separate from the rest of your system. For example, on a PC, you could do most of your browsing, email and messaging inside a virtual machine. On a phone with GrapheneOS you could install those on a separate profile that is isolated from the rest of your phone.
Unfortunately, we see once again that we live in a world where nothing and nobody can be trusted.
Comments
There are 0 responses. Follow any responses to this post through its comments RSS feed. You can leave a response, or trackback from your own site.