<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" /><updated>2026-02-25T00:14:58+00:00</updated><id>/feed.xml</id><title type="html">CalyxOS</title><subtitle>CalyxOS</subtitle><entry><title type="html">CalyxOS progress report - final steps to set CalyxOS back on track</title><link href="/news/2026/02/24/calyxos-progress-update-2/" rel="alternate" type="text/html" title="CalyxOS progress report - final steps to set CalyxOS back on track" /><published>2026-02-24T00:00:00+00:00</published><updated>2026-02-24T00:00:00+00:00</updated><id>/news/2026/02/24/calyxos-progress-update-2</id><content type="html" xml:base="/news/2026/02/24/calyxos-progress-update-2/"><![CDATA[<ul>
  <li>We have completed the setup of the new HSM-based signing process</li>
  <li>Current work focuses on a new release server and Gerrit instance</li>
  <li>A new dedicated sysadmin has joined the team</li>
</ul>

<p>Welcome to our first CalyxOS progress report of 2026. January was a busy month for the team: finalizing provisioning ceremony operations and scripts, establishing the new signing infrastructure with our newly onboarded CalyxOS sysadmin, and attending <a href="https://fosdem.org/2026/">FOSDEM2026</a>. We are grateful for the questions, concerns, and suggestions shared with us from our community, and sincerely apologize for any delayed response and update.</p>

<h3 id="calyxos-new-hsm-based-signing-infrastructure">CalyxOS’ new HSM-based signing infrastructure</h3>

<p>Throughout January, the CalyxOS team has been focusing on the implementation of the new signing infrastructure to facilitate and streamline our future development. With the completion of the provisioning ceremony, we are now equipped with the new signing toolkit built by us and <a href="https://github.com/trailofbits/publications?tab=readme-ov-file#cryptography-reviews">audited by Trail of Bits</a>. This new signing infrastructure achieved two major goals:</p>
<ul>
  <li>It resolved the potential bottlenecks and security risks that come with relying on a single person, machine, or HSM to sign every release.</li>
  <li>It reduced the chance of compromise of the signing keys by preventing exporting them in plaintext.</li>
</ul>

<p>You can read our <a href="https://calyxos.org/news/2026/02/10/calyxos-hsm-signing/">deep dive into the whole process</a> or watch <a href="https://fosdem.org/2026/schedule/event/AV8MA9-open-source-hsm-based-aosp-signing/">our talk at FOSDEM2026</a>.</p>

<h3 id="setting-up-new-release-server-and-gerrit-code-review">Setting up new release server and Gerrit Code Review</h3>

<p>We are now at the final step to resume CalyxOS: stabilizing the release cycle for our 25+ supported devices with the upgraded development infrastructure. To give an example, our release server upgrade has been in the backlog for more than 18 months. After a thorough inspection over the past few months, we came to the conclusion that our Gerrit and release servers should be set up with easier, regular backups to protect the project from server-side incidents. We are now migrating the CalyxOS release server to the organization’s Vultr instance along with the web server that is hosting the CalyxOS website. As a result, at the moment you might encounter downtime or missing objects if you are syncing CalyxOS sources. You can find more information about the organization’s larger infrastructure revamp <a href="https://calyx.org/news/2025/update-on-member-portal-and-data">here</a>.</p>

<h3 id="dedicated-expanded-systems-administrator-support">Dedicated, expanded Systems Administrator support</h3>

<p>More good news: we are pleased to have Nat Meysenburg supporting the CalyxOS system admininstration work. Nat joined our team at the beginning of 2026 and has been playing an instrumental role in our infrastructure modernization from server management redesign to code documentation. With Nat as our new member, we are steadily rebuilding the team capacity with a much more refined workflow.</p>]]></content><author><name></name></author><summary type="html"><![CDATA[We have completed the setup of the new HSM-based signing process Current work focuses on a new release server and Gerrit instance A new dedicated sysadmin has joined the team]]></summary></entry><entry><title type="html">Lessons from CalyxOS signing process redesign</title><link href="/news/2026/02/10/calyxos-hsm-signing/" rel="alternate" type="text/html" title="Lessons from CalyxOS signing process redesign" /><published>2026-02-10T00:00:00+00:00</published><updated>2026-02-10T00:00:00+00:00</updated><id>/news/2026/02/10/calyxos-hsm-signing</id><content type="html" xml:base="/news/2026/02/10/calyxos-hsm-signing/"><![CDATA[<ul>
  <li>This post is based on the <a href="https://fosdem.org/2026/schedule/event/AV8MA9-open-source-hsm-based-aosp-signing/">talk</a> our team gave at FOSDEM 2026.</li>
  <li>It provides a deep dive into our HSM-based signing redesign.</li>
  <li>Video recording of this talk is available <a href="https://video.fosdem.org/2026/ub4132/AV8MA9-open-source-hsm-based-aosp-signing.av1.webm">here</a>.</li>
</ul>

<p><img src="/assets/images/fosdem2026-hsm.png" alt="Image by JeroenHeijmans drawn at FOSDEM" width="90%" /></p>

<p>Image created by <a href="https://mastodon.social/@jeroenheijmans/115991012006835253">Jeroen Heijmans</a></p>

<h3 id="why-are-we-using-a-hsm">Why are we using a HSM?</h3>

<p>Code signing is commonly used to cryptographically verify the origin of software. A typical Android build consists of many individually signed pieces, which requires a significant amount of signing keys. Among these keys, the most important is used for <a href="https://source.android.com/docs/security/features/verifiedboot">verified boot</a>, which establishes a full chain of trust for all parts of the operating system.</p>

<p>Each key comes in two parts: the certificate and the private key. Developers use the private keys to make the cryptographic signatures, which need to be stored somewhere. This is typically a file on a storage medium. However, if anyone gets a copy of that file they can make valid signatures indefinitely and there is no way to stop them. It is impossible to verify where there are any copies of the key file, where they exist, or who has access to them. That is quite a risk. It also makes giving more than one person access to the keys quite challenging and thus is bad for your <a href="https://en.wikipedia.org/wiki/Bus_factor">bus factor</a>.</p>

<p>To improve the security, you can store keys in special hardware security modules (HSMs) instead of files on a computer. These modules use tamper-resistant storage hardware that makes it extremely hard to extract private keys without authentication. Even though it may be possible for powerful actors, such as nation-state intelligence, to extract key material if they gain physical access to the module, a HSM is still much more secure than storing keys as files on a computer.</p>

<p>A common use-case for HSMs is to simplify and automatize signing of build artifacts in a <a href="https://en.wikipedia.org/wiki/Continuous_integration">continuous integration</a> environment (CI). An attacker that compromises the CI machine could make malicious signatures. If you stored your signing key in a file that is extractable in plaintext, you have no choice but to generate new signing keys. But with a HSM, if you detect the breach, you can stop the attacker by preventing their access to the HSM.</p>

<p>Note that for now, CalyxOS has no plans to automate signing in this way. We will start with manual signing on a dedicated and secured machine where the HSM is only connected when needed.</p>

<h3 id="defining-criteria-for-secure-signing-operations">Defining criteria for secure signing operations</h3>

<p>By now, it is evident why new keys were needed; generating fresh keys gave us a clean slate with no unknown copies floating around, and allowed us to fully control the redesign and safety of our new signing solution. Next, we defined the criteria for the hardware backing our HSM solutions; you can find the criteria in <a href="https://calyxos.org/news/2025/11/10/calyxos-progress/">our November 2025 community update</a>. This set of criteria helped us reach our goals in three categories: <strong>security</strong>, <strong>operational practicality</strong>, and <strong>transparency</strong>. Many solutions, while meeting our security requirements, were not immediately available, financially affordable, auditable, or aligned to our organizational mission to promote and advance open-source tech.</p>

<p>Our process of evaluating options for the secure signing operation involved many discussions and trade-offs until we could make technical decisions. We looked into cloud-based HSMs, such as the Amazon Cloud HSM, enterprise-grade appliances, such as Thales Luna HSMs and Entrust nShield, and more affordable options, such as Nitrokey NetHSM. Also considered were smaller hardware dongles, such as the YubiHSM 2 and the Nitrokey HSM 2.</p>

<p>We decided to start with a simpler, HSM based, intermediate solution with a quick startup path that would let us soon start signing releases with new keys. That being said, we built in a migration path to a better or final signing solution.</p>

<p>In the end, we decided to start with the YubiHSM 2.</p>

<h3 id="key-wrapping-a-secure-way-to-manage-keys-with-limited-storage-space">Key wrapping: A secure way to manage keys with limited storage space</h3>

<p>It is worth noting that YubiHSM 2 has very limited storage space. It cannot fit all the signing keys required to sign our builds since we use a unique key for each device and different components. This issue is not unique to CalyxOS, it also applies to other projects that need lots of keys,
e.g. <a href="https://f-droid.org/">F-Droid</a>.</p>

<p>Thankfully, there is a solution for this problem called key wrapping. Keys that don’t fit on the HSM can be stored outside, encrypted. When you need to use them, you can import them into the HSM and decrypt them inside. The key that encrypts and decrypts the signing key set, called the <em>wrap key</em>, is always stored securely inside the HSM. This way, signing keys are never available in plaintext outside of the HSM.</p>

<h3 id="key-backup-why-and-how">Key backup: Why and how?</h3>

<p>When using HSMs, there is always a possibility they might break, fail, or get stolen, necessitating a plan to securely backup the keys. The actual signing keys are only available outside of the HSM in encrypted form, so you can back them up in the same way as you back up other files. Still, for the signing keys to be useful, we also need the <em>wrap key</em>, which is only available inside the HSM. Of course, a plaintext backup of the wrap key needs to be avoided, because it re-introduces all the same problems the HSM was supposed to solve.</p>

<p>The best option we found was <a href="https://en.wikipedia.org/wiki/Shamir%27s_secret_sharing">Shamir’s Secret Sharing (SSS)</a>. This sharing algorithm was first developed in 1979. With this technique, we split the wrap key up into several parts, also known as shards. The wrap key could only get reconstructed when a pre-defined number of shards were present. We opted for five shards with a threshold of three shards required to recover the wrap key. Instead of relying on one person to securely back up private keys, we rely on a group of three out of five people to keep each of their shards safe and only ever combine these in a special ceremony.</p>

<h3 id="key-provisioning-ceremony">Key provisioning ceremony</h3>

<p>Somehow, the key material needs to get into the HSM. This could be for restoring a wrap key backup as stated above or when generating the initial key material. Unfortunately, the YubiHSM 2 doesn’t have SSS implemented in its firmware and even the <a href="https://github.com/Yubico/yubihsm-setup/blob/68bf3c7aa2d5c7e3efb05af471fafb551fa84e11/src/main.rs#L481#L481">official setup utility</a> briefly holds the wrap key in memory, splits it into shards, and imports it back into the HSM. So for both cases, we need a secure ceremony that tries to ensure that key material can not leak in any way.</p>

<p>As you can see in <a href="https://calyxos.org/news/2025/12/17/calyxos-progress-update/">our last community update</a>, we spent quite some time in designing, testing, reviewing, and preparing for the key provisioning ceremony. And the whole key ceremony package was audited by <a href="https://www.trailofbits.com/">Trail of Bits</a>. You can find their <a href="https://github.com/trailofbits/publications?tab=readme-ov-file#cryptography-reviews">audit report</a>.</p>

<p>The ceremony taught a few practical lessons. To prevent a targeted attack from compromising the machine used in the provisioning ceremony, we bought a compatible device from a randomly selected store immediately beforehand. To establish a trusted and secure environment, we used an epheremal live OS with a good security track record: <a href="https://tails.net/">TailsOS</a>. Using TailsOS on a random out-of-the-box machine came with its own constraints; we needed to use a DVD as our initial data medium for ceremony scripts and TailsOS files. Prior to creating the bootable TailsOS flash drive, we also needed to verify the integrity of the live medium on Windows, the out-of-the-box operating system. Our specific solution was to create a reproducible <code class="language-plaintext highlighter-rouge">.iso</code> file and burn that onto a DVD. Then, in Windows, we used powershell commands, which ware also used in the <a href="https://github.com/juicebox-systems/ceremony">Juicebox HSM Key Ceremony</a>, to compute the SHA256 hash of the entire drive. The operator confirmed the hash by reading it aloud in front of all ceremony participants for everyone to verify the hash of our <code class="language-plaintext highlighter-rouge">.iso</code> file:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>4b1f31960c64fe0bf5bb7087f8d06923cce611a795f510f028fe3811b4c25847
</code></pre></div></div>

<p>If you are interested, you can reproduce this hash on your own computer following <a href="https://gitlab.com/CalyxOS/calyxos/-/work_items/3447#note_3009846831">our instructions</a>.</p>

<p>After verifying the DVD and the files stored on it, we created a live Tails drive with a flash drive we (also) bought randomly. To ensure security, we made sure to keep the ceremony computer offline throughout the entire procedure, from the initial Windows Setup Wizard to the running of the ceremony scripts on TailsOS.</p>

<p>The next step was rather quick and smooth as we booted into the Tails drive to run the audited scripts from the DVD to set up two HSMs, one for operation and the other for backup. We did a physical factory reset for both the YubiHSM 2 devices and turned on auditing (you can find more about this in the following paragraphs). The script then created three authentication keys: one for the signing operator, one for the admin, and one for the auditor.</p>

<p>The wrap key was then created in the HSM, split into shards, and imported into both HSMs. The shards and the authentication keys were encrypted to pre-defined public keys using <a href="https://github.com/FiloSottile/age">age</a>.</p>

<h3 id="android-signing-with-pkcs11">Android signing with PKCS#11</h3>

<p>All tools involved in Android signing support PKCS#11, an <a href="https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=pkcs11">OASIS standard</a>, C interface to let software communicate with a HSM and also referred to as Cryptoki. It is a common choice when replacing signing keys in files with an HSM. However, we couldn’t find out-of-the-box PKCS#11 solutions for signing Android builds. As far as we know, we were the first Android ROM building a complete PKCS#11 Android signing solution and documenting it. It was possible that bigger OEMs had been taking this route to sign their builds with HSMs. Or at least we hope so.</p>

<p>Android’s entire signing process is quite complex. It is not only about signing lots of apps, but apps inside partitions that get unpacked, repacked after all contents have been signed, and finally signed themselves.</p>

<p>There are three different tools used throughout the signing process: apksigner, signapk and OpenSSL. All of them need to get hooked up to use our HSM but each is used in their unique ways and troubleshooting tool-specific bugs takes time.</p>

<p>For example, apksigner was using a PKCS#11 module, but it <a href="https://gitlab.com/CalyxOS/calyxos/-/work_items/3434">didn’t close sessions</a>, which caused a denial of service because of the limited number of open sessions allowed and the long timeout. To add to this, we found signapk quite <a href="https://gitlab.com/CalyxOS/calyxos/-/work_items/3417">buggy</a> and not usable with strictly PKCS#11-compliant solutions. So we had to switch to using apksigner instead. It remained unclear to us why Google would use two different tools here when one could simply do the job.</p>

<p>Other changes we made included performance improvements. For instance, apksigner would load the entire key store at each start. If the keys were on the HSM, this would take a long time. Since we used apksigner a lot, we added a batch mode to it.</p>

<p>We also disabled <a href="https://source.android.com/docs/security/features/apksigning#schemes">V1 signatures</a> for our apps. V1 signatures require a lot of HSM operations (one for each file in the APK). Plus, it is not needed in recent Android versions.</p>

<p>The next steps for us include continuing the code cleanup, revising the changes with better, more sustainable logic, and further improving signing performance by using a signing cache (so that signing the same component will use the same HSM and key only once).</p>

<p>All of our source code for the above is free and open-sourced. We invite all custom ROM development teams who are curious about signing with HSMs to contact us and collaborate. You can find links to them at the bottom of this post.</p>

<h3 id="auditing">Auditing</h3>

<p>Keeping the signing keys safe with a multiparty backup approach was important but we wanted to go further. Being auditable at all times was another important goal for us to improve our signing design; specifically addressing the issue where whoever performed the actual signing with the HSM would still hold significant power. While they could not extract the signing keys themselves, they could sign arbitrary things with those keys, such as a malicious app. With a valid signature, an imposter app can replace the real app installed on a victims’ device.</p>

<p>With this in mind, we aimed to audit all signing operations, which led us to the discovery of more limitations of the YubiHSM 2. Similar to the limited key storage, the space for saving the audit log is equally limited. If you don’t want to lose logs you need to regularly fetch logs from the HSM. Since we enabled a force-log mode, a full log would cause a denial of service. This was where some of our own toolings came in; we intercepted every signing command and ensured that logs would get flushed to a file on disk. The audit logs were then pushed to an append-only git repository where CI would automatically verify the hash chain of signing log.</p>

<p>Even with these logs, there were still room for improvement: the audit log on the HSM wasn’t cryptographically signed and we needed extra steps to verify the log in the git repo against the one in the signing artifacts. Since the log contained sparse information, we would need to manually retain all signed artifacts to properly investigate a potential incident. Despite the improvements we are planning, this has got us a head start in reviving CalyxOS.</p>

<hr />

<p>This project came to fruition with the support of many open-source tools. We would like to thank the tool developers, our security auditors, and everyone who has contributed to this work along our journey. The talk was presented by <a href="https://gitlab.com/aysha12">aysha</a> and <a href="https://gitlab.com/grote">Torsten Grote</a> on the CalyxOS team with a special thanks to <a href="https://gitlab.com/t-m-w">t-m-w</a>.</p>

<p>If you are curious about our work and want more details, you can check out our <a href="https://gitlab.com/CalyxOS/vendor_calyx/-/blob/225f0dda34109fc85fa69f647b7e72753adbe8d8/scripts/pkcs11/DOCUMENTATION.md">PKCS#11 documentation</a> and <a href="https://gitlab.com/CalyxOS/vendor_calyx/-/blob/6d4d024ae/scripts/hsm_provisioning/README.md">provisioning documentation</a> on this topic. All of our signing-related scripts can be found <a href="https://gitlab.com/CalyxOS/vendor_calyx/-/tree/4a07f419fb9f86417d24dadb0f5314e033983005/scripts">here</a>.</p>

<p>Here’s a list of patches we had to make to AOSP:</p>
<ul>
  <li><a href="https://gitlab.com/CalyxOS/platform_build/-/commit/6962d7ab4cd91dd53265ab6deacc3f628fbb80e4">Add PKCS#11 signing support</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_build/-/commit/1c810cfcab496a1bf213f96f329f997bc4f7c3b4">Add argument to keep temporary files</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_build/-/commit/0cd789aeb7aa217014576221989d04968526283e">Don’t add quotes around signing_args</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_build/-/commit/af5a3b003a7ced41108100d3eaa1f2d552eba4fb">Use apksigner for most APK and APEX signing</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_build/-/commit/0d37c304584b103131f85c1d971a1d821fbfa2fa">Add option to use a signing command interceptor</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_system_apex/-/commit/afd136efc87e7d99ff4e0b7e42e18591ab0b94d9">Add support for a signing command interceptor</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_tools_apksig/-/commit/5275610e05b5010c9f8bc07d0b65b99dbf130942">Add alignment override option like signapk</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_tools_apksig/-/commit/12a329fefe23b4abe5879a5078311e9fb00b48b9">Log out of SunPKCS11 on exit</a></li>
  <li><a href="https://gitlab.com/CalyxOS/platform_tools_apksig/-/commit/391b20b75c737afe7d2ed1400d95641468cfedbb">Add batch mode to reuse loaded keystore</a></li>
</ul>

<p>If you have more questions, feel free to <a href="https://calyxos.org/community/">get in touch with us</a>.</p>]]></content><author><name></name></author><summary type="html"><![CDATA[This post is based on the talk our team gave at FOSDEM 2026. It provides a deep dive into our HSM-based signing redesign. Video recording of this talk is available here.]]></summary></entry><entry><title type="html">CalyxOS progress report - ceremony preparation, QPR ports, and FOSDEM</title><link href="/news/2025/12/17/calyxos-progress-update/" rel="alternate" type="text/html" title="CalyxOS progress report - ceremony preparation, QPR ports, and FOSDEM" /><published>2025-12-17T00:00:00+00:00</published><updated>2025-12-17T00:00:00+00:00</updated><id>/news/2025/12/17/calyxos-progress-update</id><content type="html" xml:base="/news/2025/12/17/calyxos-progress-update/"><![CDATA[<ul>
  <li>Our final open HSM-based key provisioning plan is undergoing auditing before the key ceremony</li>
  <li>CalyxOS devices, including extended support, are being ported to Android 16 QPR1 while QPR2 support plan is being developed</li>
  <li>We are improving community support with the new Community Coordinator</li>
  <li>Catch up with us at FOSDEM in Brussels on January 31 2026!</li>
</ul>

<p>Following <a href="https://calyxos.org/news/2025/11/10/calyxos-progress/">last month’s update</a>, the CalyxOS team is entering the final stage for the new signing plan and policy. In addition, we are working on bringing CalyxOS supported devices up to Android 16 QPR2 and building the team capacity with new hires. Here is a detailed rundown of our work:</p>

<h3 id="signing-finalization-and-audit">Signing finalization and audit</h3>

<p>Our team has reached a final draft for the new HSM-based signing process. This includes a detailed plan for the initial key ceremony, provisioning scripts, and the verification methodology of each element in the process. Based on the <a href="https://calyxos.org/news/2025/11/10/calyxos-progress/">criteria we laid out before</a> and our requirements for signing CalyxOS builds and apps at the frequency of every one to three months, our goal for this new signing design is ensure that all key material will have a secure backup so that no single person can hold access to our signing keys. The main key we will be generating during a provisioning ceremony will be split into shards using Shamir’s Secret Sharing. Each shard is only ever stored encrypted and kept safe by a designated team member. Together with security auditors we selected a <a href="https://github.com/hashicorp/vault/tree/main/shamir">library</a> for this job and wrote our own simple Go executable with it, which could create reproducible builds and was already audited.</p>

<p>All the provisioning tools, key ceremony operational plan, and auditing mechanism are being packaged for a final security audit.</p>

<p>Once this package for key signing provisioning passes the audit from our security consultant, we will perform the key ceremony and deploy the new signing mechanism for CalyxOS. We anticipate this to happen in the next few weeks and will keep you updated on audit progress.</p>

<h3 id="android-16-qpr1-and-qpr2">Android 16 QPR1 and QPR2</h3>

<p>We are pleased to share that we have booted Android 16 QPR1 on all modern devices on <a href="https://calyxos.org/docs/guide/device-support/">our supported device list</a> and are testing full CalyxOS functionality while also porting it to the rest of the our supported devices. What’s more, we have started analysis of the <a href="https://android-developers.googleblog.com/2025/12/android-16-qpr2-is-released.html">newly published QPR2</a> and are building out our QPR2 sync plan and timeline for all supported devices.</p>

<p>In the meantime, we are setting out to migrate our CalyxOS Gerrit Code Review instance to a new and faster server as part of the Calyx Institute’s data infrastructure overhaul. The success of the Gerrit migration will stabilize and facilitate our QPR2 bringup.</p>

<h3 id="building-capacity-for-the-calyxos-team-continued">Building capacity for the CalyxOS team, continued</h3>

<p>Last month, Lucas, a long-time CalyxOS contributor, joined the team as the Community Coordinator. You might have been familiar with Lucas on our various community channels, including Matrix room and CalyxOS subreddit. We will keep improving our community communications with the tremendous help from Lucas. To start, we will try to make sure we respond to all questions and concerns. If you have any comments or suggestions, please do not hesitate to ping us on our channels.</p>

<p>The position of CalyxOS Android Board Support Packages (BSP) Engineer has been closed and we have entered the interview stage. We will soon have a few more openings on our <a href="https://job-boards.greenhouse.io/calyxinstitute">job board</a>. Stay tuned!</p>

<h3 id="meet-the-calyxos-team-at-fosdem-2026">Meet the CalyxOS team at FOSDEM 2026</h3>

<p>If you plan to attend <a href="https://fosdem.org/2026/">FOSDEM 2026</a> and are interested in knowing more about our effort in HSM signing upgrade, we will present our methodologies and lessons at the <a href="https://fosdem.org/2026/schedule/track/foss-on-mobile/">FOSS on Mobile devroom</a>. Looking forward to seeing you there!</p>]]></content><author><name></name></author><summary type="html"><![CDATA[Our final open HSM-based key provisioning plan is undergoing auditing before the key ceremony CalyxOS devices, including extended support, are being ported to Android 16 QPR1 while QPR2 support plan is being developed We are improving community support with the new Community Coordinator Catch up with us at FOSDEM in Brussels on January 31 2026!]]></summary></entry><entry><title type="html">CalyxOS progress report — signing, team capacity, and more</title><link href="/news/2025/11/10/calyxos-progress/" rel="alternate" type="text/html" title="CalyxOS progress report — signing, team capacity, and more" /><published>2025-11-10T00:00:00+00:00</published><updated>2025-11-10T00:00:00+00:00</updated><id>/news/2025/11/10/calyxos-progress</id><content type="html" xml:base="/news/2025/11/10/calyxos-progress/"><![CDATA[<ul>
  <li>CalyxOS is working seamlessly with our security consultants to finalize the HSM signing solution.</li>
  <li>The Calyx engineering is fixing our data infrastructure.</li>
  <li>Three new roles are open for CalyxOS.</li>
</ul>

<p>As <a href="https://calyxos.org/news/2025/09/30/how-to-reach-the-calyxos-team/">promised</a>, today the CalyxOS team is sharing an update on our progress to improve the project and increase transparency.</p>

<p>Throughout the past few weeks, the team has been focusing on improving the security of our critical infrastructure and tackling long lasting challenges. In addition, we are revising our communication strategy toward a combination between providing thorough updates and building capacity for direct engagement in our community channels. Understandably, the decrease of the team voice and public actions have raised questions and concerns around the capacity of the project. We would like to respond to concerns people have raised by confirming that CalyxOS hasn’t been compromised and the organization is directing significant resources to get it back on track. We deeply appreciate all the people who have been sharing their concerns with us. And we will try our best to address their questions in this report.</p>

<h2 id="redesigning-the-calyxos-signing-process">Redesigning the CalyxOS signing process</h2>

<p>We are finalizing the design of a Hardware Security Module (HSM) signing solution for CalyxOS. A HSM is a dedicated physical hardware device that generates and stores cryptographic keys in a tamper-resistant environment; the keys never leave the HSM, which puts a guardrail against key extraction and compromise. We decided to move to a HSM because signing keys are a critical part of the chain of trust: they are what verifies to your device that an update actually comes from CalyxOS and hasn’t been tampered with.</p>

<p>Our criteria for the CalyxOS signing solution were that it should be: <strong>available</strong>, <strong>affordable</strong>, <strong>secure</strong>, <strong>expandable</strong>, <strong>auditable</strong>, <strong>redundant</strong>, <strong>easy to access</strong>, and <strong>aligned to the mission of the Calyx Institute</strong>. These requirements were what led us to choose the HSM solution among available options. Specifically, we selected the YubiHSM2 based on our current urgent development requirements and resources as an interim solution while we evaluate and build out a long-term solution. To keep our solutions consistent with a seamless transition in the future, we are ensuring that our keys are transferable both operationally and technically, and that CalyxOS users will not need to reflash their devices beyond the initial installation.</p>

<p>Our work has also included integrating AOSP’s documented <a href="https://source.android.com/docs/core/ota/sign_builds">signing process</a> with PKCS #11, the public-key cryptography standard for communicating with HSMs and cryptographic devices. To make that happen, we are building an interface layer between the two that does not yet exist in the standard AOSP tools or within the FOSS community.</p>

<p>Right now, we are finalizing the detailed provisioning plan for the signing process under the guidance and testing from our independent, third-party security consultants.</p>

<p>Once the new signing infrastructure and procedure is in place, documentation and code will be shared as a FOSS project as part of our commitment to open source, transparency, and community collaboration.</p>

<h2 id="adapting-to-the-new-norm-of-aosp-releases">Adapting to the new norm of AOSP releases</h2>

<p>Google has made serious changes to AOSP development in the last few months; monthly security patches are often empty and public git tags for developers, which make it easy to identify patches, are no longer available. As the changes unfold gradually, the challenge of keeping a regular and timely development cycle with all these AOSP changes remains significant as the custom ROM community has spoken about extensively.</p>

<p>Despite these challenges, we have made the decision to — in our best effort — further extend our device support for moto g32, g42, g52, Pixel 5, 4a 5G, and Pixel 5a 5G when CalyxOS resumes update releases. That means people with these devices can install the Android 16 version of CalyxOS when it becomes available. We are still gauging whether we can ship QPR1 to these extended release devices, pending the release of the QPR1 source; QPR2 is even less certain as we assess the work involved. Once we have builds ready with a thorough evaluation of the case, we will publish a confirmed new EOL date for devices for which we provide extended support.</p>

<p>In the interim, we have also reached out to our peer custom ROM developers and several device manufacturers to align strategies to sustainably access and publish OS security patches. We hope that this collective effort of the global FOSS community will stop the trend of closing source for AOSP and other open-source projects.</p>

<h2 id="building-capacity-for-the-calyxos-team">Building capacity for the CalyxOS team</h2>

<p>In reality, Calyx has been a small team running a lot of projects, not least of all CalyxOS. We are stretched thin right now and our priority has been getting CalyxOS back up and running ASAP. As we are drafting this report, we are also working diligently to expand development capacity and optimize team structure. We have brought Lucas—a long-time CalyxOS community facilitator—to the team as our new Calyx Community Coordinator, a role that has never existed in the organization before. In addition, we are in active recruitment for the <a href="https://job-boards.greenhouse.io/calyxinstitute/jobs/4934856007">CalyxOS Android Board Support Packages (BSP) Engineer</a> position and a new Android Platform Software Developer. Keep an eye on our <a href="https://job-boards.greenhouse.io/calyxinstitute">job board</a> and please help spread the word!</p>]]></content><author><name></name></author><summary type="html"><![CDATA[CalyxOS is working seamlessly with our security consultants to finalize the HSM signing solution. The Calyx engineering is fixing our data infrastructure. Three new roles are open for CalyxOS.]]></summary></entry><entry><title type="html">An update on how to reach the CalyxOS team</title><link href="/news/2025/09/30/how-to-reach-the-calyxos-team/" rel="alternate" type="text/html" title="An update on how to reach the CalyxOS team" /><published>2025-09-30T00:00:00+00:00</published><updated>2025-09-30T00:00:00+00:00</updated><id>/news/2025/09/30/how-to-reach-the-calyxos-team</id><content type="html" xml:base="/news/2025/09/30/how-to-reach-the-calyxos-team/"><![CDATA[<ul>
  <li>An update on how CalyxOS will provide support on each community channel</li>
  <li>Team support will withdraw from the Telegram channel</li>
</ul>

<p>Dear CalyxOS community members,</p>

<p>We would like to share an update on how to reach the CalyxOS team given the recent traffic insights and our internal temporary shortage of staffing. As we work hard to get the project back on track, including its community channels, we are increasingly concerned with the rapidly growing spam messages in the Telegram channel. Historically, this community channel, like every other CalyxOS community channel, has been fully administrated and moderated by volunteers and the moderator bot that was set up to bridge between the CalyxOS Matrix and Telegram channels. And the CalyxOS team tried our best to make sure they are governed under the CalyxOS <a href="https://calyxos.org/community/code-of-conduct/">Code of Conduct</a> and <a href="https://calyxos.org/community/pledge/">Community Pledge</a>.</p>

<p>As we are transitioning the project, we also aim to refine our community support to make the best use of small team’s capacity at the moment. To further clarify, here is a rundown of how you can seek help or support from the CalyxOS team on our community channels:</p>
<ul>
  <li>To seek a quick answer to a technical question, the best way is to reach us in our <a href="https://app.element.io/#/room/#CalyxOS:matrix.org">Matrix room</a>. You can tag @calyx_institute:matrix.org to ensure a response.</li>
  <li>To report bug or send feature / functionality request, please start a new issue on the <a href="https://gitlab.com/CalyxOS/calyxos/-/issues">Calyx GitLab</a>. Regular triage and review will restart in mid-October.</li>
  <li>To follow the latest CalyxOS updates, you can check the <a href="https://x.com/CalyxOS">CalyxOS X</a> and <a href="https://fosstodon.org/@calyxos">Mastodon</a> accounts.</li>
  <li>We will also continue to sync all CalyxOS updates to the <a href="https://www.reddit.com/r/CalyxOS/">CalyxOS subreddit</a> and answer questions when we have the time.</li>
</ul>

<p>Going forward, we will withdraw our support from the Telegram channel to make sure our main channel is fully supported. However, the Telegram channel will continue to run as a entirely community-led space, however, our team is unable to moderate nor delegate moderator privilege in those groups at this time. We thank all the admins and superusers on Telegram who have been voluntarily facilitating a democratic space for CalyxOS with our deepest gratitude.</p>

<p>Please stay tuned for our next community periodical progress report which will be coming within the next week!</p>]]></content><author><name></name></author><summary type="html"><![CDATA[An update on how CalyxOS will provide support on each community channel Team support will withdraw from the Telegram channel]]></summary></entry><entry><title type="html">Last OTA update before the new CalyxOS release</title><link href="/news/2025/08/27/last-ota-update-before-new-calyxos-release/" rel="alternate" type="text/html" title="Last OTA update before the new CalyxOS release" /><published>2025-08-27T00:00:00+00:00</published><updated>2025-08-27T00:00:00+00:00</updated><id>/news/2025/08/27/last-ota-update-before-new-calyxos-release</id><content type="html" xml:base="/news/2025/08/27/last-ota-update-before-new-calyxos-release/"><![CDATA[<ul>
  <li>This is the last over-the-air (OTA) update to all current and supported CalyxOS devices, before CalyxOS resumes development from its current hiatus.</li>
  <li>The OTA update warns people of the risk of running the current, unmaintained version of CalyxOS.</li>
  <li>It also includes a patch to enable Moto and Fairphone users to install CalyxOS while the project is on pause in response to emerging public requests.</li>
</ul>

<h3 id="whats-included">What’s included</h3>

<p>As mentioned in our letter to the <a href="/news/2025/08/01/a-letter-to-our-community/">CalyxOS community</a>, this project has been on a hiatus for the last two months. However, we are concerned with the many existing CalyxOS users who may have not been made aware of this important change. To reach as many active CalyxOS users as we can, our team decided collectively to push one last OTA update to inform all people currently running CalyxOS about the hiatus and its impact.</p>

<p>Therefore, rather than a typical monthly update, this OTA update alerts people through a system notification that their current version of CalyxOS will no longer receive updates from our team and a link to our community letter. Once the project comes out of the hiatus, you will be alerted with an additional notification, and reinstalling CalyxOS will be required to receive updates going forward.</p>

<p>In addition, Moto and Fairphone devices will receive a patch to fix <a href="/install/antirollback-update-pending/">the issue related to the anti-rollback protection (ARB) feature</a> we discovered earlier. We hope this can provide a temporary solution to people who are seeking to run CalyxOS on these devices before they can establish a long-term plan. Note that since there will be no more updates to the existing version of CalyxOS installed on your device, future releases from the manufacturer to increment the ARB index are likely to cause the same issue mentioned above.</p>

<p>We understand that some people will continue running CalyxOS until our next release, so alongside this notification, we have included the latest open source security updates for Android 15 (although this is not a full CalyxOS security update).  This OTA update, however, is not related to our Android 16 port or the AOSP QPR1 update. We are closely monitoring the AOSP QPR1 release and working hard on bringing up Android 16 with all feature updates and security patches along with our current need to overhaul the project.</p>

<h3 id="rollout">Rollout</h3>

<table>
  <thead>
    <tr>
      <th>Release channel</th>
      <th>Date</th>
      <th>Notes</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>Security express</td>
      <td>2 September, Tuesday</td>
      <td> </td>
    </tr>
    <tr>
      <td>Beta</td>
      <td>2 September, Tuesday</td>
      <td> </td>
    </tr>
    <tr>
      <td>Stable</td>
      <td>3 September, Wednesday</td>
      <td> </td>
    </tr>
  </tbody>
</table>

<h3 id="changelog">Changelog</h3>
<ul>
  <li>CalyxOS 6.10.10 / 6.10.20</li>
  <li>Android 15</li>
  <li>August 2025 Security update (2025-08-01) with platform patches only.</li>
  <li>Critical notice that maintenance of all current installations have been paused.</li>
</ul>]]></content><author><name></name></author><summary type="html"><![CDATA[This is the last over-the-air (OTA) update to all current and supported CalyxOS devices, before CalyxOS resumes development from its current hiatus. The OTA update warns people of the risk of running the current, unmaintained version of CalyxOS. It also includes a patch to enable Moto and Fairphone users to install CalyxOS while the project is on pause in response to emerging public requests.]]></summary></entry><entry><title type="html">A letter to the CalyxOS community</title><link href="/news/2025/08/01/a-letter-to-our-community/" rel="alternate" type="text/html" title="A letter to the CalyxOS community" /><published>2025-08-01T00:00:00+00:00</published><updated>2025-08-01T00:00:00+00:00</updated><id>/news/2025/08/01/a-letter-to-our-community</id><content type="html" xml:base="/news/2025/08/01/a-letter-to-our-community/"><![CDATA[<p> 
 </p>

<p><strong>Update: December 17 2025</strong></p>

<p><a href="/news/2025/12/17/calyxos-progress-update/">CalyxOS progress report - ceremony preparation, QPR ports, and FOSDEM</a></p>

<p> </p>

<hr />

<p> </p>

<p><strong>Update: November 10 2025</strong></p>

<p><a href="/news/2025/11/10/calyxos-progress/">CalyxOS progress report — signing, team capacity, and more</a></p>

<p> </p>

<hr />

<p> </p>

<p><strong>Update: September 30 2025</strong></p>

<p><a href="/news/2025/09/30/how-to-reach-the-calyxos-team/">An update on how to reach the CalyxOS team</a></p>

<p> </p>

<hr />

<p> </p>

<p><strong>Update: August 27 2025</strong></p>

<p>We are concerned that some users may have not seen the important message in this letter about CalyxOS’ current hiatus. Therefore, we are rolling out one last OTA update to devices currently running CalyxOS to reach as many active users as we can. You can read <a href="/news/2025/08/27/last-ota-update-before-new-calyxos-release/">our post</a> for more details about this update.</p>

<p> </p>

<hr />

<p> </p>

<p><strong>Update: August 5 2025</strong></p>

<p>We appreciate your valid concerns and questions around the security and safety of CalyxOS.</p>

<p>First, we want to assure you that we have no reason to believe the security of CalyxOS and its signing keys have been compromised.</p>

<p>As you know, we announced a recent leadership transition. When senior personnel have access to signing keys and leave a team, it is security best practice to update signing keys and conduct audits. So in accordance with that, we are using this transition period to update our security protocols, including updating the signing keys and taking other steps to further protect our users.</p>

<p>In the past, security audits have been conducted for parts of CalyxOS, such as the <a href="https://seedvault.app/2021-security-quickscan-ros.pdf">Seedvault project</a>, but not for the entire project. As more and more people across the globe started using this tool, we intend to conduct a broader security audit and publish the reports for the public to review.</p>

<p>As mentioned in our community letter below, we estimate that this audit and the implementation of new security protocols and signing keys will take four to six months, but we will endeavor to complete this process as soon as possible. However, for the time being, current CalyxOS users will not be able to receive further security software updates until our new security protocols are in place.</p>

<p>Without security updates, we can only be honest that this does not guarantee the level of security we strive for, especially when global threats to privacy and human rights are at a critical moment. That is why in the meantime we have posted the recommendation that people who are running CalyxOS should uninstall the OS and follow our <a href="/community/">community channels</a> for updates, including when the latest version of CalyxOS becomes available again.</p>

<p>In case you wish to migrate to another custom ROM in the meantime, we’ve now published updated guides on how to back up and restore your device using <a href="/docs/guide/apps/seedvault/">Seedvault</a> and how to <a href="/install/stock/">restore your device to stock</a>.</p>

<p>We also understand that many community members have expressed interest in having an installation option/images for CalyxOS available again. Due to the overwhelming feedback from our community, we’ve decided to <a href="/get/factory">make the images publicly available</a> once more. <strong>Please be aware that this decision is not a recommendation to migrate to CalyxOS now.</strong></p>

<p>Please note that, just as current users will not receive further software updates without reinstalling CalyxOS when future updates are released, any device installing CalyxOS in the near future will also need to reinstall it. We want to ensure that all users are well informed before deciding to install CalyxOS at this time.</p>

<p>Again, we are very sorry for this development and we thank you for giving us—the project and more importantly the team—tremendous trust and support. We are doing our very best on our end, and are committed to keeping CalyxOS secure and this decision is a result of that commitment.</p>

<p> </p>

<hr />

<p> </p>

<p>Dear CalyxOS community members,</p>

<p>The last few months have been especially challenging for us as we have experienced some changes within our teams and in the Android free and open-source (FOSS) development community.</p>

<p>Nicholas Merrill, president and founder of Calyx Institute, has left the organization to pursue other projects.</p>

<p>Nick has championed privacy and data security over the last 25 years, and we thank Nick for his decades-long leadership, guidance, and contributions.</p>

<p>Chirayu Desai, the CalyxOS Tech Lead, has addressed his departure from the CalyxOS project and the organization in <a href="https://www.reddit.com/r/CalyxOS/comments/1lxgnp8/a_personal_note/">a personal note to the public</a>.</p>

<p>We also want to express gratitude to Chirayu for his enthusiasm and incredibly hard work on CalyxOS.</p>

<p>Nick and Chirayu have been a part of the CalyxOS project and its global community for many years. Without a doubt, there is a gap to fill following their departure. 
Following their departure, there will be a period of transition as we move forward. During that time, Calyx Institute’s Interim Executive Director, Ellen McDermott, will continue to lead the organization’s important work while the CalyxOS team will focus on bridging the gap and recentering our efforts.</p>

<p>Our commitment to <a href="https://calyxinstitute.org/about">our mission</a> has not changed: defending digital privacy, advancing connectivity, and striving for a future where everyone has access to the resources and tools they need to remain securely connected. CalyxOS is an integral part of our work and stands at the center of the FOSS digital ecosystem we aspire to create. It is our responsibility to protect the privacy of current and future users of our technologies.</p>

<p>To ensure operational consistency during this transition and adhere to security best practices, our team is working to improve transparency and security through better design, communications, and infrastructure. Our ongoing priorities include:</p>
<ul>
  <li>Upgrading the tech infrastructure supporting CalyxOS development</li>
  <li>Stabilizing update release cycles for our 25+ supported devices</li>
  <li>Revising and updating our usage and development documentation, wiki, and user guides</li>
</ul>

<p> </p>

<p>To fulfill our <a href="https://calyxos.org/community/pledge/">community pledge</a> and foster collaboration, information sharing, and inclusivity, we are engaging with our peers, partners, and security experts to ensure the delivery and integrity of all changes made during this process. After conducting a thorough inspection of the work required for successful completion of the above priorities, we have determined that it may take up to four to six months for us to provide the level of security maintenance we aim to deliver.</p>

<p>We will be switching to new signing keys along with the overhaul of the signing and verification process. As a result, current CalyxOS users will not be able to receive further security software updates until this process is in place.</p>

<p>Given the potential risk posed by the pause of maintenance and development, it’s logical that we stop providing options to install CalyxOS for now. This was an incredibly hard decision to make, and we understand that this decision may cause significant difficulties for our users.
For those wishing to remain on CalyxOS until our next release, note that you will not have the latest security patches on your device as released from the Android Open Source Project and from any proprietary sources provided by device manufacturers. We sincerely apologize for the hassle brought to you by this change, and we understand if you need to uninstall CalyxOS and migrate to another privacy-protecting Android distribution in the meantime. If you wish to continue using CalyxOS in the future, please follow our updates to reinstall CalyxOS when it becomes available again.</p>

<p>We are committed to supporting you through this process. To assist any migration, we will publish, by August 6, instructions to back up and restore your phone to a stock or custom Android distribution with Seedvault.</p>

<p>Starting with this announcement, we will be reporting our progress regularly through our <a href="https://calyxos.org/community/">community channels</a>, and we welcome your insights if you would like to contribute to this effort.</p>

<p>We thank you for your continued trust and look forward to further collaborations with people who have, are, and will be using and contributing to CalyxOS and various FOSS projects.</p>

<p>Yours sincerely,<br />
The Calyx team</p>]]></content><author><name></name></author><summary type="html"><![CDATA[   ]]></summary></entry><entry><title type="html">Community update - our progress on CalyxOS after the release of Android 16</title><link href="/news/2025/06/26/community-update-android-16/" rel="alternate" type="text/html" title="Community update - our progress on CalyxOS after the release of Android 16" /><published>2025-06-26T00:00:00+00:00</published><updated>2025-06-26T00:00:00+00:00</updated><id>/news/2025/06/26/community-update-android-16</id><content type="html" xml:base="/news/2025/06/26/community-update-android-16/"><![CDATA[<ul>
  <li>We have analyzed the potential impact on CalyxOS that the release of Android 16 will have, and the future trends it may be imply.</li>
  <li>Given the upstream changes and internal needs, the CalyxOS team is revising our development methodologies and processes for secure and streamlined future updates.</li>
  <li>In the last two weeks, we have made significant progress in building and running Android 16 on Pixel 6 and newer Pixels.</li>
  <li>We are working to bring up the rest of modern Pixels before shifting focus to Motorola and Fairphone devices.</li>
</ul>

<p>As we shared in our <a href="https://calyxos.org/news/2025/06/11/android-16-plans/">previous announcement</a>, the biggest change Google made with the release of Android 16 to AOSP was to not release the Pixel device configuration sources (device trees) and its driver binaries. Because Google has been leading the development of AOSP, this move not only means that Google’s internal development progress will further impact the timelines of custom Android distributions (ROMs), but also indicates that what has previously been open to the entire free and open-source software (FOSS) community is slowly and gradually being closed.</p>

<h3 id="what-it-means-to-calyxos-future-plans">What it means to CalyxOS future plans</h3>

<p>For developing CalyxOS (and other peer custom Android ROMs) on a variety of devices, there are three key elements to ensure coherent and consistent maintenance: device kernels, device trees, and the proprietary binaries used for different components of the system. In the past, releases of Android versions usually included Pixel device trees in AOSP or otherwise made them available for download. This allowed custom Android ROM developers to easily identify the configurations Google made in new Android versions and customize them accordingly. Starting with the Android 16 release, FOSS custom ROM developers will need to build and maintain their own device trees for Pixels, which takes a lot of guesswork and reverse engineering. Comparing code changes and finding ways around proprietary codes will be a major burden in all future updates.</p>

<p>However, this impact is somewhat limited on CalyxOS. A key factor in our resilience is that CalyxOS has been supporting devices from a diverse range of phone makers besides the Google Pixels — such as Motorolas, Fairphones, and SHIFTphones — which helps us adapt to device-specific development processes and code availabilities. Furthermore, our testing has been focusing on replicating real world experience seamlessly in our development process and we will continue this effort.</p>

<p>With this trend, we are also anticipating more changes in Android 16 QPR1 or QPR2 that could potentially impact kernels — there could be features that existing device kernels are not compatible with and will require significant work to continue to support past each of these AOSP updates.</p>

<p>The trend of Google’s gradual privatization of Android OS development, albeit challenging to all custom ROM developers, has drawn attention to the importance and efficiency of tools, methodologies and processes in each stage of the development, signing and release, especially when it is happening across 20+ devices on a regular cadence, and respects the significance of quick security updates. This most recent change has prompted a close look into our current workflow. Concurrently, we are conducting a series of serious internal reprioritizations, including development (cleaning device trees, automating the extracting and matching stock properties and policies), release (preparing to make it easier for future updates), and key signing (reinforcing and ensuring key integrity, resilience, audibility, and a secure chain of trust). As a result, our users will see a hiatus in our usual schedule with respect to security and general updates. We sincerely apologize for the impact this hiatus has on users of CalyxOS, but we believe this overhaul is vital to ensuring we can put our best efforts into protecting the privacy and digital security of people who trust us by using and contributing to CalyxOS.</p>

<h3 id="what-people-should-know-with-devices-we-currently-support">What people should know with devices we currently support</h3>

<h4 id="pixels">Pixels</h4>

<h5 id="modern-pixels">Modern Pixels</h5>
<p>We have made significant progress bringing up Android 16 on all currently supported modern Pixels with GS201/GS101 chips (Pixel 6 and later models). We are cleaning up the Pixel device trees to make them easier to mantain and update in the future. Support is planned to continue despite the changes introduced by Google in Android 16. Update dates in the near future will be delayed as we adjust and improve our processes to build a sustainable and secure pipeline.</p>

<h5 id="extended-support-pixels">Extended support Pixels</h5>
<p>Pixel devices in our <a href="https://calyxos.org/docs/guide/device-support/" target="_blank">extended support category</a> will be evaluated after mainline Android 16 work is done. We will share more details once we complete the assessment of the possible kernel backport work required in the near future and feature compatibility.</p>

<h4 id="motorola-fairphone">Motorola, Fairphone</h4>
<p>We are currently focused on completing our Android 16 port to Pixel devices. Support timeline will be reviewed afterwards with updates to follow per model.</p>

<h3 id="looking-ahead">Looking ahead</h3>

<p>Our next step is to consolidate the schedule for ensuing updates and share it publicly, as is expected from our community. This will include adjusting timelines for Android 16 and security updates in the near future, between now and QPR1. If you are using CalyxOS with a device mentioned above, please stay tuned on our website for the update schedule. If you are looking to start using CalyxOS today, we recommend that you kindly wait for our next update. You can reach us in our <a href="https://calyxos.org/community/" target="_blank">community channels</a> for any specific questions about CalyxOS, Android 16 and our plan. We will strive to release timely updates on our progress and plan as we have them, to our website.</p>

<p>As part of our broader mission, the Calyx Institute and CalyxOS team is committed to providing privacy-respecting tools and resources, centering on CalyxOS, that are accessible and usable by people, even as the Android landscape continues to change.</p>]]></content><author><name></name></author><summary type="html"><![CDATA[We have analyzed the potential impact on CalyxOS that the release of Android 16 will have, and the future trends it may be imply. Given the upstream changes and internal needs, the CalyxOS team is revising our development methodologies and processes for secure and streamlined future updates. In the last two weeks, we have made significant progress in building and running Android 16 on Pixel 6 and newer Pixels. We are working to bring up the rest of modern Pixels before shifting focus to Motorola and Fairphone devices.]]></summary></entry><entry><title type="html">Android 16 and Pixel Support</title><link href="/news/2025/06/11/android-16-plans/" rel="alternate" type="text/html" title="Android 16 and Pixel Support" /><published>2025-06-11T00:00:00+00:00</published><updated>2025-06-11T00:00:00+00:00</updated><id>/news/2025/06/11/android-16-plans</id><content type="html" xml:base="/news/2025/06/11/android-16-plans/"><![CDATA[<ul>
  <li>On June 10th, Google released Android 16 to AOSP - but without Pixel device-specific source code.</li>
  <li>This unexpected change impacts all custom Android ROM development, including CalyxOS.</li>
  <li>We’re adapting our plans and will share updates as development progresses.</li>
</ul>

<p>Google has released Android 16 to AOSP, but this year’s release is different in a significant way: none of the usual source code for Pixel phones has been made available. This impacts not only CalyxOS, but the entire custom Android ecosystem.</p>

<p>Here’s what we know so far.</p>

<h3 id="androids-release-model-today">Android’s release model today</h3>

<ul>
  <li>Google continues to build on the <strong>trunk-stable / quarterly platform release (QPR)</strong> model, which has evolved since Android 12.</li>
  <li>Instead of one big annual release, Android now rolls out larger and larger updates every quarter (QPRs), with features, UI changes, and improvements landing throughout the year.</li>
  <li>This model improves consistency but increases complexity—especially for downstream projects like CalyxOS. We’ve already started porting our changes to AOSP 16, but this cycle presents new challenges.</li>
</ul>

<h3 id="why-android-16-is-different">Why Android 16 is different</h3>

<p>Android 16 was released to <a href="https://android.googlesource.com/platform/manifest/+/android-16.0.0_r1">AOSP</a> yesterday but with a one big difference than typical releases:</p>
<ul>
  <li><strong>Google did not publish any device-specific source code for supported, modern Pixel devices.</strong></li>
  <li>In previous years, Google released full device trees alongside new Android versions. This allowed developers to build and boot AOSP on Pixel hardware relatively easily.</li>
  <li>With Android 16, only the platform/framework code has been released. The device trees are missing, at least for now.</li>
</ul>

<p>This means AOSP 16 cannot currently be built or run on any recent Pixel device easily just using official source. It’s unclear whether this is a delay or a policy change. Either way, it seriously disrupts custom ROM development and our porting efforts.</p>

<h3 id="calyxos-device-support-status">CalyxOS Device Support Status</h3>
<h4 id="pixel-6---9a">Pixel 6 - 9a</h4>

<ul>
  <li>Without official source code, these devices are currently unsupported for AOSP 16 builds.</li>
  <li>Pixel devices were widely supported in the custom ROM space due to their open-source friendliness (until now).</li>
  <li>We’ll need to approach them like other non-AOSP supported devices: with the GPL Linux kernel sources and updates to Android 15 device trees, which takes time and ongoing effort.</li>
</ul>

<h4 id="fairphones-motorolas">Fairphones, Motorolas</h4>

<ul>
  <li>We’ll look into the status of Android 16 on these devices after we’re done with porting CalyxOS changes in general to AOSP 16</li>
  <li>We’ll post an update per device once we know more.</li>
</ul>

<h4 id="pixel-5-series">Pixel 5 series</h4>

<ul>
  <li>We’ll look into the status of Android 16 at the end, and see what we can do, wrt extending support.</li>
</ul>

<h3 id="references">References</h3>
<ul>
  <li><a href="https://source.android.com/docs/setup/start">Building AOSP for Pixel Devices (Android 15 Guide)</a></li>
  <li><a href="https://android.googlesource.com/">AOSP Source code</a></li>
</ul>]]></content><author><name></name></author><summary type="html"><![CDATA[On June 10th, Google released Android 16 to AOSP - but without Pixel device-specific source code. This unexpected change impacts all custom Android ROM development, including CalyxOS. We’re adapting our plans and will share updates as development progresses.]]></summary></entry><entry><title type="html">June 2025 Security update</title><link href="/news/2025/06/09/june-security-update/" rel="alternate" type="text/html" title="June 2025 Security update" /><published>2025-06-09T00:00:00+00:00</published><updated>2025-06-09T00:00:00+00:00</updated><id>/news/2025/06/09/june-security-update</id><content type="html" xml:base="/news/2025/06/09/june-security-update/"><![CDATA[<ul>
  <li>CalyxOS 6.8.20 and 6.8.21 - Android 15 is now available for all supported devices</li>
  <li>June security update (2025-06-01)</li>
</ul>

<h3 id="rollout">Rollout</h3>

<table>
  <thead>
    <tr>
      <th>Release channel</th>
      <th>Date</th>
      <th>Notes</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>Security express</td>
      <td>6 June, Friday</td>
      <td> </td>
    </tr>
    <tr>
      <td>Beta</td>
      <td>6 June, Friday</td>
      <td> </td>
    </tr>
    <tr>
      <td>Stable</td>
      <td>9 June, Monday</td>
      <td> </td>
    </tr>
  </tbody>
</table>

<h3 id="changelog">Changelog</h3>
<ul>
  <li>CalyxOS 6.8.20 / 6.8.21</li>
  <li>Android 15</li>
  <li>June 2025 Security update (2025-06-01)</li>
  <li>Chromium: 137.0.7151.72</li>
</ul>

<h4 id="moto-g32">moto g32</h4>
<ul>
  <li>Revert recent brightness changes causing low brightness</li>
</ul>

<h2 id="note">Note</h2>

<div class="alert alert-info" style="margin-top: 3rem">
<ul>
  <li>
    <strong>Over-the-air Updates:</strong>
    [[CalyxOS updates =&gt; updates]] are delivered over-the-air (OTA) automatically, without any manual intervention needed. However, if you'd like to manually update your CalyxOS install, see [[OTA =&gt; ota]].
  </li>
  <li>
    <strong>Security Updates:</strong>
    The <strong>Pixel 9a, 9 Pro Fold, 9 Pro XL, 9 Pro, 9, 8a, 8 Pro, 8, Fold, Tablet, 7a, 7 Pro, 7, 6a, 6 Pro, 6</strong> contain the full security patch, as they are still being updated by Google.
  </li>
  <li>
    <strong>Security Updates:</strong>
    The <strong>Fairphone 5, 4, Motorola moto g 5G - 2024, moto g84 5G, moto g34 and g45 5G</strong> stock OS follows a different security update release schedule, which usually lags behind by a month or two compared to Pixels. The CalyxOS releases for it only contain the latest fixes to the open source components, such as the OS code and the Linux kernel. Proprietary components such as the bootloader, modem firmware, and other firmware get updates as soon as the stock OS update is available.
  </li>
  <li>
    <strong>End-of-life:</strong>
    The <strong>Motorola moto g52, moto g42, moto g32, Pixel 5a (5G), 4a (5G), 5</strong> are no longer being updated by the manufacturer, so the CalyxOS releases for these devices only contain the fixes to the open source components, such as the OS code and the Linux kernel. Proprietary components such as the bootloader, modem firmware, and other firmware no longer get updates.
  </li>
</ul>
</div>]]></content><author><name></name></author><summary type="html"><![CDATA[CalyxOS 6.8.20 and 6.8.21 - Android 15 is now available for all supported devices June security update (2025-06-01)]]></summary></entry></feed>