8 comments
@iska @safiuddinkhan @cyberspook @m0xee @dushman
"Distributions like PureOS are not particularly secure. They are mostly a reskinned Debian and do not include substantial hardening." https://madaidans-insecurities.github.io/linux-phones.html @inference @safiuddinkhan @cyberspook @m0xee @dushman I'm talking about the hardware there. You can install a hardened OS on it, including ChromiumOS or Android-x86. @iska @safiuddinkhan @cyberspook @m0xee @dushman Chromium OS doesn't have verified boot, only Chrome OS does.
There is no system outside of ARM phones and tablets which take advantage of a HSM or TEE to allow storing OS signing keys (not the same as bootloader/kernel keys, which is secure boot). Computer Security is an unachievable goal, the most reasonable thing to do is not connect your computer to internet 24/7.
@colinsmatt11 @safiuddinkhan @inference @dushman @m0xee @cyberspook Besides you need hardware access or hard fuckups to compromise boot. Guix with LUKS and SELinux is 99.99% secure, with simplicity and freedom; and definitely better than proprietary jails. @inference @safiuddinkhan @cyberspook @iska @dushman You may be right, but this article is just bad. Hardening in the OS is not good enough so we can just install Android 🤷 |
@inference @safiuddinkhan @cyberspook @m0xee @dushman
How would google's edition of GNU/Linux have verified boot but not normal?
https://elinux.org/images/f/f8/Verified_Boot.pdf
puri.sm is even more secure, even neutralizing IME. Here's one of their features.
https://puri.sm/posts/new-pureboot-feature-scanning-root-for-tampering/