Conversation

Replying to
The newer kernel branches have lots of new vulnerabilities and attack surface. It's not clear if vulnerabilities are even being fixed at a faster rate than they're being added. Similarly, it's unclear if ongoing hardening work outweighs endless new attack surface / complexity.
1
10
The Linux kernel uses a fundamentally insecure architecture, insecure tools, and has a development culture treating correctness and especially security as an afterthought. It ultimately needs to replaced, but until then, best effort approaches minimizing the harm are important.
2
16
This Tweet is from a suspended account. Learn more
Replying to
The Linux kernel and other fundamentally insecure software projects designed and implemented without robustness and security as core principles. The Linux kernel is likely getting less secure over time, not more secure, and there is no feasible way to fix a problem of this scale.
2
7
Replying to
Almost entirely security theater with no real impact. Not relevant in any way to solving these kinds of problems or mitigating kernel vulnerabilities. It's based around providing a bogus, incomplete form of secure boot not actually providing any real security value to end users.
1
1
Replying to and
It's a marketing-focused, incomplete and useless approach to secure boot. The total value of it is negligible and it's very unfortunate that it's all grouped together as part of something that's almost completely nonsense with no real threat model or use case thought out for it.
1
1
Replying to
I've complained a lot about this patch series and the marketing-based nonsense approach to secure boot motivating it. Unfortunately, that fell on deaf ears, and in the end security theater is what triumphs. It's part of the general problem with the Linux approach to "security".
1
1
Replying to and
Secure boot that only protects firmware and the kernel doesn't make any sense. The kernel doesn't do anything useful by itself. Also, treating the kernel boundary this way is *extremely* harmful in terms of being able to reduce kernel attack surface and move complexity out of it.
1
1
Replying to and
Complexity should be moving out of the kernel into isolated userspace processes, not into the kernel, which is what's happening. Code moves into the kernel as a bad workaround for ecosystem fragmentation and based on this nonsense that kernel code is more trustworthy/secure.
5