In March 2019, we checked the LineageOS-based ROM provided by the French /e/ foundation. In this article, we look at the /e/ Android ROM again to check whether issues identified by us are still present.
Always stay in the loop!
Subscribe to our RSS/Atom feeds.
Like last time, we wiped our Moto G4. Then, we installed a fresh copy of /e/ using
adb sideload. Initially, we skipped most configuration. We only set the local time. The setup asks you to optionally register for an /e/ account. We didn't do this.
After initial configuration, we connected the Moto G4 with a dedicated VLAN to monitor its complete network traffic.
Before we analyze the network traffic, we look at features of /e/ like last time. The current ROM for the Moto G4 (build date August 3, 2019) is based on Android 7.1.2 like last time (Android 7.1.2 is still officially supported by Google). The Android security patch level is July 5, 2019, according to the settings. So it is the latest patch level for Android.
Preinstalled apps are among others:
- Apps (/e/ app store)
- Bliss Launcher
- Chromium-based /e/ web browser
- LibreOffice Viewer
- Magic Earth (maps client)
- K-9 Mail-based mail client
- microG Services Core
- MuPDF mini (PDF viewer)
- Open Camera
- OpenKeychain (OpenPGP client)
- QKSMS (SMS messenger, branded as foundation.e.message)
- Weather client
- several apps included in LOS/Android (Clock, Contacts etc.)
Obviously, they removed Signal and Telegram, and added their own Apps store.
Security, and privacy
Since this article also isn't focused on features of /e/, we again look at security and privacy aspects. The /e/ Foundation promotes their same-named mobile OS as “ungoogled”, coming with “carefully selected apps”.
Communication with the internet
In this section, we discuss several findings regarding /e/‘s network traffic when connected to the internet.
Hello Google, you are still there
Last time, we saw that /e/ connected to Google servers for its connectivity check. This time, we see exactly the same behavior:
Our G4 connects to
184.108.40.206, a Google server. There is a new issue (#268) on /e/‘s GitLab instance. Seemingly, they try to set up their own server for connectivity checks to get rid off Google here.
Last time, other users reported that /e/ used Google's DNS servers (e.g., 220.127.116.11) by default. We weren't able to reproduce this, and mentioned this in our last report. /e/ closed the related ticket #269, and stated “This is not true […] The conclusion was that 18.104.22.168 and 2000:: are only used in Bionic to figure out if some IPv4 or IPv6 is available.”
Besides, there is still network traffic from/to www.gstatic.com, clientservices.googleapis.com and www.google.com via IPv4. This is tracked by issue #271. Issue #271 is still open and there are no relevant comments.
NTP synchronization around the world
This finding didn't change at all. See our last report.
The related issue #272 on /e/‘s GitLab instance states: “This is something probably not extremely challenging in term of user’s data privacy protection and at least it doesn’t go to Google. Actually maybe we should sort out the list of NTP servers and keep only ‘trusted ones’, if this exists. And/or add some /e/ NTP servers.”
Weather app still leaks personal data in cleartext
Last time, the preinstalled weather app (foundation.e.weather, version 4.4) leaked our location in real-time. Each time, we searched for a location to get the current weather, the app sent a GET request to api.openweathermap.org in cleartext. One example was
GET /data/2.5/find?q=lin&type=like&cnt=15&APPID=50[…]8 HTTP/1.1. If we used the device's GPS to get weather information, it leaked our current position.
The weather app still leaks data like your location in cleartext. Obviously, /e/ didn't add HTTPS to encrypt data in transit. However, they seemingly changed the user agent to
okhttp/3.2.0. Last time, it was
Dalvik/2.1.0 (Linux; U; Android 7.1.2; Moto G4 Build/NJH47F), leaking device information. This is interesting since the version number didn't change.
The related issue #273 on /e/‘s GitLab instance states: “The weather app will be improved, to use HTTPS and remove user-agent. […]". The issue is still open. The problem of leaking data is still present.
Magic Earth–again cleartext traffic
We checked Magic Earth (com.generalmagic.magicearth, version 22.214.171.124…) again. Last time, we identified that the app talked to 12 different IP addresses owned by General Magic. Ten times the communication was in cleartext only.
This time, we experienced the same behavior. It is still unclear why only some traffic is encrypted.
The related issue #274 on /e/‘s GitLab instance states: “MagicEarth provided us a quite comprehensive document regarding privacy, and we are working with them to improve this aspect. We will discuss with them the issue with unencrypted traffic.” So there is no update here.
The App store of /e/
In March, there was no app store installed by default. This time, /e/ ships their own app store “Apps” (foundation.e.apps, version 1.1.5).
The app allows you to request new apps, search for apps and also games, and you can download/install apps, of course. /e/ seemingly offers a broad mix of apps, contrary to F-Droid. So you also find apps like “SWAT and Zombies - Defense & Battle” that contain ads and trackers. Some people probably don't like this, however, there is a chance to get rid off third-party stores to access Google's infrastructure (like Aurora Store).
We checked for version information of 10 random apps for comparison:
|Name||/e/ version||Google Play version|
|Firefox Klar||8.0.15||device dependent|
So some apps are slightly older than on Google Play. ¹Note that Orfox is totally outdated and insecure. Don't use it. We don't know why they added this app to their app store.
Using the Apps store results in traffic to/from “cleanapk.org”. We don't know who operates this domain. The device downloaded two certificates (api.cleanapk.org and apk.cleanapk.org). Most communication was TLS 1.2 encrypted. It would be nice to get some information about “cleanapk.com”. Maybe, this domain is operated by /e/ for their app store.
/e/ Foundation website
Last time, we also identified some issues with the website of /e/. For instance, their versions of WordPress and WooCommerce were outdated and contained publicly-known security vulnerabilities.
We checked their main website e.foundation again. This time, it runs WordPress 5.2.2 (the current version) and WooCommerce 3.6.5 (the current version). The server itself runs Apache 2.4.29 on Ubuntu 18.04 LTS (last time, it ran Apache 2.4.10 on Debian 8). Looking only at version numbers, this was clearly improved by /e/.
Interestingly, the Google font is gone now. Last time, /e/ stated that removing the font hosted by Google isn't important for them since their promise regarding being Google-free doesn't include their website. The related issue #275 talks about issues with the CMS, and it is still open.
Compared with our last report, the overall situation is slightly improved. Their website is based on up-to-date software now, and they removed the Google font. Additionally, they seemingly masked the user agent of the Weather app. Most other findings are still unaddressed, though.
The new app store is a chance to completely get rid off of Google Play, however, we don't know about the relationship with “cleanapk.com”, and how they ship their apps (e.g., who builds and signs the apps?).
As before, /e/ looks promising, it isn't Google-free by now.
- GitLab issue #268 'Infosec Handbook Review Issues : “.... /e/ .. using Google for connectivity check:”'external link
- GitLab issue #271 'Infosec Handbook Review Issues : “...TLS 1.2-encrypted traffic from/to www.google.com.... via IPv4/IPv6.”'external link
- GitLab issue #272 'Infosec Handbook Review Issues : “NTP synchronization leaks IP Address to many different domain names”'external link
- GitLab issue #273 'Infosec Handbook Review Issues : “... Weather app leaks IP address and other details...in cleartext.”'external link
- GitLab issue #274 'Infosec Handbook Review Issues : “ Info is sent/received to/from General Magic in cleartext.”'external link
- GitLab issue #275 'Infosec Handbook Review Issues : “Info on usage of Google fonts shared in January, no response from /e/.”'external link