← Back to context

Comment by jmclnx

4 hours ago

So LP is or has left Microsoft ?

>We are building cryptographically verifiable integrity into Linux systems

I wonder what that means ? It could be a good thing, but I tend to think it could be a privacy nightmare depending on who controls the keys.

Verifiable to who? Some remote third party that isn't me? The hell would I want that?

  • Just an assumption here, but the project appears to be about the methodology to verify the install. Who holds the keys is an entirely different matter.

    • Werner Von Braun only built the rockets; he didn't aim them, nor did he care where they landed.

      (London. On some of my relatives.)

      3 replies →

  • https://0pointer.net/blog/authenticated-boot-and-disk-encryp...

    You. The money quote about the current state of Linux security:

    > In fact, right now, your data is probably more secure if stored on current ChromeOS, Android, Windows or MacOS devices, than it is on typical Linux distributions.

    Say what you want about systemd the project but they're the only ones moving foundational Linux security forward, no one else even has the ambition to try. The hardening tools they've brought to Linux are so far ahead of everything else it's not even funny.

The events includes a conference title "Remote Attestation of Imutable Operating Systems built on systemd", which is a bit of a clue.

  • I'm sure this company is more focused on the enterprise angle, but I wonder if the buildout of support for remote attestation could eventually resolve the Linux gaming vs. anti-cheat stalemate. At least for those willing to use a "blessed" kernel provided by Valve or whoever.

    • Road to hell is paved with good intentions.

      Somebody will use it and eventually force it if it exists and I don't think gaming especially those requiring anti-cheat is worth that risk.

      If that means linux will not be able to overtake window's market share, that's ok. At-least the year of the linux memes will still be funny.

      1 reply →

rust-vmm-based environment that verifies/authenticates an image before running ? Immutable VM (no FS, root dropper after setting up network, no or curated device), 'micro'-vm based on systemd ? vmm captures running kernel code/memory mapping before handing off to userland, checks periodically it hasn't changed ? Anything else on the state of the art of immutable/integrity-checking of VMs?

Sounds like kernel mode DRM or some similarly unwanted bullshit.