Hi PlugOS team,
I have a question regarding PlugOS’s Android stack and its security assumptions.
As far as I understand, most real-world Android systems rely on proprietary vendor blobs (bootloader components, hardware drivers, firmware interfaces, etc.). Projects like Replicant attempted to eliminate these blobs entirely, but practical support seems very limited today.
So I’m curious:
-
Does PlugOS Android include proprietary vendor blobs?
-
If yes, how does PlugOS mitigate the security risks associated with closed-source vendor components?
-
Are these blobs treated as trusted, or as potentially untrusted parts of the system?
-
How does this align with PlugOS’s threat model, especially against supply-chain or nation-state–level attacks?
There is also ongoing academic research discussing the security risks of vendor blobs in Android systems, which makes this topic particularly interesting from a security-design perspective.
Would appreciate an official clarification on how PlugOS approaches this.
Thanks!
This is an important and very reasonable question.
Do proprietary vendor blobs exist in PlugOS?
Yes.
Like any practical Android system running on modern SoCs, PlugOS includes a limited set of vendor-provided binary components, such as hardware drivers and firmware interfaces.
A fully blob-free Android stack is currently not viable for real-world hardware. This is a technical reality, not a PlugOS-specific choice.
Are these vendor blobs trusted?
No.
PlugOS does not treat vendor blobs as trusted components.
Our security model explicitly assumes that:
Vendor blobs may be buggy, vulnerable, or even malicious.
This assumption applies regardless of vendor, country of origin, or political jurisdiction.
How does PlugOS mitigate the risks of closed-source components?
PlugOS focuses on containment, isolation, and privilege minimization, not blind trust.
Specifically:
-
Vendor blobs are strictly limited to hardware enablement
-
They run with minimal privileges
-
They are isolated from sensitive user workloads
-
They have no direct access to user data
-
All cryptographic operations and data protection occur in layers fully controlled by PlugOS
In other words, even if a vendor blob were compromised, its ability to cause harm is severely constrained by design.
How does this align with supply-chain and advanced threat models?
PlugOS does not rely on supply-chain trust for security.
Instead, it is designed so that:
-
No single vendor component is trusted by default
-
Compromise of individual components does not directly expose user data
-
Security is enforced through architectural boundaries, not assumptions about vendor intent
This approach is aligned with defending against strong adversaries, including supply-chain or even more advanced adversaries.
Thanks for your detail reply.