Update About webpage from version 5.1.1.98 to 5.2.0.100

This commit is contained in:
inference 2023-09-02 15:45:25 +01:00
parent bcced57750
commit 18d36f02af
Signed by: inference
SSH Key Fingerprint: SHA256:FtEVfx1CmTKMy40VwZvF4k+3TC+QhCWy+EmPRg50Nnc

View File

@ -5,7 +5,7 @@
<!-- Copyright 2022 Jake Winters -->
<!-- SPDX-License-Identifier: BSD-3-Clause -->
<!-- Version: 5.1.1.98 -->
<!-- Version: 5.2.0.100 -->
<html>
@ -31,54 +31,54 @@
<h1>About</h1>
<section id="toc">
<!-- Table of contents -->
<h2 id="toc"><a href="#toc" class="h2">Table of Contents<a/></h2>
<h2 id="toc"><a href="#toc">Table of Contents<a/></h2>
<ul>
<li><a href="#about_me" class="body-link">About Me</a></li>
<li><a href="#licensing" class="body-link">Licensing</a></li>
<li><a href="#about_me">About Me</a></li>
<li><a href="#licensing">Licensing</a></li>
<ul>
<li><a href="#licensing-preferred" class="body-link">Preferred</a></li>
<li><a href="#licensing-preferred">Preferred</a></li>
<ul>
<li><a href="#licensing-preferred-code" class="body-link">Code<a/></li>
<li><a href="#licensing-preferred-code">Code<a/></li>
<ul>
<li><a href="#licensing-bsd-3-clause-clear" class="body-link">BSD 3-Clause Clear License</a></li>
<li><a href="#licensing-mit" class="body-link">MIT License</a></li>
<li><a href="#licensing-gpl-2.0" class="body-link">GNU General Public License v2.0</a></li>
<li><a href="#licensing-bsd-3-clause-clear">BSD 3-Clause Clear License</a></li>
<li><a href="#licensing-mit">MIT License</a></li>
<li><a href="#licensing-gpl-2.0">GNU General Public License v2.0</a></li>
</ul>
<li><a href="#licensing-preferred-non-code" class="body-link">Non-code</a></li>
<li><a href="#licensing-preferred-non-code">Non-code</a></li>
<ul>
<li><a href="#licensing-cc-by-4.0" class="body-link">Creative Commons Attribution 4.0 International</a></li>
<li><a href="#licensing-cc-by-4.0">Creative Commons Attribution 4.0 International</a></li>
</ul>
</ul>
<li><a href="#licensing-other" class="body-link">Other</a></li>
<li><a href="#licensing-other">Other</a></li>
<ul>
<li><a href="#licensing-other-code" class="body-link">Code</a></li>
<li><a href="#licensing-other-code">Code</a></li>
<ul>
<li><a href="#licensing-gpl-3.0" class="body-link">GNU General Public License v3.0</a></li>
<li><a href="#licensing-gpl-3.0">GNU General Public License v3.0</a></li>
</ul>
<li><a href="#licensing-other-non-code" class="body-link">Non-code</a></li>
<li><a href="#licensing-other-non-code">Non-code</a></li>
<ul>
<li><a href="#licensing-cc-by-nc-4.0" class="body-link">Creative Commons Attribution Non Commercial 4.0 International</a></li>
<li><a href="#licensing-cc-by-nc-4.0">Creative Commons Attribution Non Commercial 4.0 International</a></li>
</ul>
</ul>
</ul>
<li><a href="#recommendations" class="body-link">Recommendations</a></li>
<li><a href="#recommendations">Recommendations</a></li>
<ul>
<li><a href="#hardware" class="body-link">Hardware</a></li>
<li><a href="#hardware">Hardware</a></li>
<ul>
<li><a href="#hdw-smartphone" class="body-link">Smartphone</a></li>
<li><a href="#hdw-smartphone">Smartphone</a></li>
</ul>
<li><a href="#software" class="body-link">Software</a></li>
<li><a href="#software">Software</a></li>
<ul>
<li><a href="#sfw-desktop" class="body-link">Desktop</a></li>
<li><a href="#sfw-smartphone" class="body-link">Smartphone</a></li>
<li><a href="#sfw-desktop">Desktop</a></li>
<li><a href="#sfw-smartphone">Smartphone</a></li>
</ul>
<li><a href="#music" class="body-link">Music</a></li>
<li><a href="#music">Music</a></li>
</ul>
</ul>
</section>
<section id="about_me">
<!-- About me -->
<h2 id="about_me"><a href="#about_me" class="h2">About Me</a></h2>
<h2 id="about_me"><a href="#about_me">About Me</a></h2>
<p>I am Jake Winters, also known by my pseudonym "Inference", a cybersecurity researcher
based in United Kingdom.<br>
I am the founder, lead developer, and administrator, of Inferencium.<br>
@ -96,14 +96,14 @@
I am also a modular design advocate for the ability to securely and robustly make
changes to hardware and software without the entire system being affected.</p>
<p>If you want to contact me for any reason, you can use my
<a href="https://inferencium.net/contact.html" class="body-link">contact methods</a>.</p>
<a href="https://inferencium.net/contact.html">contact methods</a>.</p>
<p>I run the public Systems Hardening XMPP channel dedicated to systems security and
privacy hardening at <code>sys-hardening@muc.xmpp.inferencium.net</code>, and its
respective off-topic channel at
<code>sys-hardening-ot@muc.xmpp.inferencium.net</code>.</p>
</section>
<section id="licensing">
<h2 id="licensing"><a href="#licensing" class="h2">Licensing</a></h2>
<h2 id="licensing"><a href="#licensing">Licensing</a></h2>
<p>Inferencium cares about upstreaming and sharing code, strongly preferring licenses which
have high license compatibility in order to permit sharing code with as many other projects
as possible; for this reason, permissive licenses are our preferred choice, while avoiding
@ -114,18 +114,18 @@
infeasible to do so. Our goal is to share code which has the least amount of restrictions as
possible, to allow wider propagation of our code and allow more use cases and possibilities,
as well as ensuring proprietary code, whenever required, is permitted to be included.</p>
<p><a href="https://iso.org/standard/81870.html" class="body-link">ISO 5962:2021</a>
<p><a href="https://iso.org/standard/81870.html">ISO 5962:2021</a>
is used for licensing, in the format
<code>SPDX-License-Identifier: &lt;license&gt;</code>; see the
<a href="https://spdx.org/licenses/" class="body-link">SPDX license list</a>
<a href="https://spdx.org/licenses/">SPDX license list</a>
for the full list of available licenses under this standard.</p>
<h3 id="licensing-preferred"><a href="#licensing-preferred" class="h3">Preferred</a></h3>
<h4 id="licensing-preferred-code"><a href="#licensing-preferred-code" class="h4">Code</a></h4>
<h5 id="licensing-bsd-3-clause-clear"><a href="#licensing-bsd-3-clause-clear" class="h5">BSD 3-Clause Clear License</a></h5>
<h3 id="licensing-preferred"><a href="#licensing-preferred">Preferred</a></h3>
<h4 id="licensing-preferred-code"><a href="#licensing-preferred-code">Code</a></h4>
<h5 id="licensing-bsd-3-clause-clear"><a href="#licensing-bsd-3-clause-clear">BSD 3-Clause Clear License</a></h5>
<code>SPDX-License-Identifier: BSD-3-Clause-Clear</code>
<p>Type: Permissive</p>
<br>
<p><a href="https://spdx.org/licenses/BSD-3-Clause-Clear.html" class="body-link">BSD 3-Clause Clear License</a>
<p><a href="https://spdx.org/licenses/BSD-3-Clause-Clear.html">BSD 3-Clause Clear License</a>
is a highly permissive
license which allows content licensed under it to be
used in any way, whether in source or binary form, and
@ -136,7 +136,7 @@
and/or its contributors may not be used to endorse or
promote products derived from the original project.<br>
BSD 3-Clause Clear License is a derivative of
<a href="https://spdx.org/licenses/BSD-3-Clause.html" class="body-link">BSD 3-Clause "New" or "Revised" License</a>,
<a href="https://spdx.org/licenses/BSD-3-Clause.html">BSD 3-Clause "New" or "Revised" License</a>,
which adds
an explicit statement clarifying that patent rights are
not granted by the license alone, and must be granted
@ -147,11 +147,11 @@
in regards to patents applied to code using the BSD
3-Clause "New" or "Revised" License.</p>
<br>
<h5 id="licensing-mit"><a href="#licensing-mit" class="h5">MIT License</a></h5>
<h5 id="licensing-mit"><a href="#licensing-mit">MIT License</a></h5>
<code>SPDX-License-Identifier: MIT</code>
<p>Type: Permissive</p>
<br>
<p><a href="https://spdx.org/licenses/MIT.html" class="body-link">MIT License</a>
<p><a href="https://spdx.org/licenses/MIT.html">MIT License</a>
is a highly permissive license which
allows content licensed under it to be used in any way,
whether in source or binary form, and allows
@ -165,16 +165,16 @@
explicit statement is made alongside this license,
increasing complexity and deviating from the standard
license text, we prefer
<a href="#licensing-bsd-3-clause-clear" class="body-link">BSD 3-Clause Clear License</a>;
<a href="#licensing-bsd-3-clause-clear">BSD 3-Clause Clear License</a>;
however, MIT License is
a great choice when derivatives using the name of the
original project and/or its contributors is a non-issue.</p>
<br>
<h5 id="licensing-gpl-2.0"><a href="#licensing-gpl-2.0" class="h5">GNU General Public License v2.0</a></h5>
<h5 id="licensing-gpl-2.0"><a href="#licensing-gpl-2.0">GNU General Public License v2.0</a></h5>
<code>SPDX-License-Identifier: GPL-2.0-only</code>
<p>Type: Copyleft</p>
<br>
<p><a href="https://spdx.org/licenses/GPL-2.0-only.html" class="body-link">GNU General Public License v2.0</a>
<p><a href="https://spdx.org/licenses/GPL-2.0-only.html">GNU General Public License v2.0</a>
is a strong
copyleft license which restricts use of content licensed
under it by requiring all source code of the content to
@ -191,17 +191,17 @@
beneficial to Inferencium code; whenever this is the
case, the GNU General Public License v2.0 will be used,
rather than the more restrictive
<a href="#licensing-gpl-3.0" class="body-link">GNU General Public License v3.0</a>,
<a href="#licensing-gpl-3.0">GNU General Public License v3.0</a>,
and relicensing
derivatives under the GNU General Public License v3.0
will be disallowed.</p>
<br>
<h4 id="licensing-preferred-non-code"><a href="#licensing-preferred-non-code" class="h4">Non-code</a></h4>
<h5 id="licensing-cc-by-4.0"><a href="#licensing-cc-by-4.0" class="h5">Creative Commons Attribution 4.0 International</a></h5>
<h4 id="licensing-preferred-non-code"><a href="#licensing-preferred-non-code">Non-code</a></h4>
<h5 id="licensing-cc-by-4.0"><a href="#licensing-cc-by-4.0">Creative Commons Attribution 4.0 International</a></h5>
<code>SPDX-License-Identifier: CC-BY-4.0</code>
<p>Type: Permissive</p>
<br>
<p><a href="https://spdx.org/licenses/CC-BY-4.0.html" class="body-link">Creative Commons Attribution 4.0 International</a>
<p><a href="https://spdx.org/licenses/CC-BY-4.0.html">Creative Commons Attribution 4.0 International</a>
is a
highly permissive license which allows content licensed
under it to be used in any way, in any medium, with the
@ -209,13 +209,13 @@
must be kept in order to attribute the original creator
of the licensed content.</p>
<br>
<h3 id="licensing-other"><a href="#licensing-other" class="h2">Other</a></h3>
<h4 id="licensing-other-code"><a href="#licensing-other-code" class="h4">Code</a></h4>
<h5 id="licensing-gpl-3.0"><a href="#licensing-gpl-3.0" class="h5">GNU General Public License v3.0</a></h5>
<h3 id="licensing-other"><a href="#licensing-other">Other</a></h3>
<h4 id="licensing-other-code"><a href="#licensing-other-code">Code</a></h4>
<h5 id="licensing-gpl-3.0"><a href="#licensing-gpl-3.0">GNU General Public License v3.0</a></h5>
<code>SPDX-License-Identifier: GPL-3.0-only</code>
<p>Type: Copyleft</p>
<br>
<p><a href="https://spdx.org/licenses/GPL-3.0-only.html" class="body-link">GNU General Public License v3.0</a>
<p><a href="https://spdx.org/licenses/GPL-3.0-only.html">GNU General Public License v3.0</a>
is a strong
copyleft license which restricts usage of content
licensed under it by requiring all source code of the
@ -236,12 +236,12 @@
only on specific systems, further restricting usage of
Inferencium code, it is avoided completely.</p>
<br>
<h4 id="licensing-other-non-code"><a href="#licensing-other-non-code" class="h4">Non-code</a></h4>
<h5 id="licensing-cc-by-nc-4.0"><a href="#licensing-cc-by-nc-4.0" class="h5">Creative Commons Attribution Non Commerical 4.0 International</a></h5>
<h4 id="licensing-other-non-code"><a href="#licensing-other-non-code">Non-code</a></h4>
<h5 id="licensing-cc-by-nc-4.0"><a href="#licensing-cc-by-nc-4.0">Creative Commons Attribution Non Commerical 4.0 International</a></h5>
<code>SPDX-License-Identifier: CC-BY-NC-4.0</code>
<p>Type: Permissive non-commercial</p>
<br>
<p><a href="https://spdx.org/licenses/CC-BY-NC-4.0.html" class="body-link">Creative Commons Attribution Non Commercial 4.0 International</a>
<p><a href="https://spdx.org/licenses/CC-BY-NC-4.0.html">Creative Commons Attribution Non Commercial 4.0 International</a>
is a permissive license which allows
content licensed under it to be used in any way, in any
medium, with the restrictions being commercial usage is
@ -254,47 +254,47 @@
not want to prevent, it is avoided completely.</p>
</section>
<section id="recommendations">
<h2 id="recommendations"><a href="#recommendations" class="h2">Recommendations</a></h2>
<h2 id="recommendations"><a href="#recommendations">Recommendations</a></h2>
<!-- Hardware I recommend as production hardware -->
<h3 id="hardware"><a href="#hardware" class="h3">Hardware</a></h3>
<h4 id="hdw-smartphone"><a href="#hdw-smartphone" class="h4">Smartphone</a></h4>
<h3 id="hardware"><a href="#hardware">Hardware</a></h3>
<h4 id="hdw-smartphone"><a href="#hdw-smartphone">Smartphone</a></h4>
<div style="overflow-x:auto;">
<table>
<tr>
<th class="table-title">Type</th>
<th class="table-title">Hardware</th>
<th class="table-title">Description</th>
<th class="table-title">Source model<br>
<th>Type</th>
<th>Hardware</th>
<th>Description</th>
<th>Source model<br>
<br>
(License - SPDX)</th>
</tr>
<tr>
<td class="table-main">Smartphone</td>
<td class="table-main"><img src="asset/img/google-pixel_6.png" width="100px" height="100px"/><br>
<tr>
<td>Smartphone</td>
<td><img src="asset/img/google-pixel_6.png" width="100px" height="100px"/><br>
<br>
Google Pixel</td>
<td>Google Pixel devices are the best Android devices
<td class="td-desc">Google Pixel devices are the best Android devices
available on the market for
<a class="body-link" href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">security and privacy</a>.<br>
<a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">security and privacy</a>.<br>
<br>
They allow locking the bootloader with a
<a class="body-link" href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later">custom Android Verified Boot (AVB) key</a>
<a href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later">custom Android Verified Boot (AVB) key</a>
in order to
preserve security and privacy features when installing a
custom operating system, such as
<a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/">verified boot</a>
<a href="https://source.android.com/docs/security/features/verifiedboot/">verified boot</a>
which verifies that the OS has not
been corrupted or tampered with, and
<a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/verified-boot#rollback-protection">rollback protection</a>
<a href="https://source.android.com/docs/security/features/verifiedboot/verified-boot#rollback-protection">rollback protection</a>
which prevents an adversary
from rolling back the OS or firmware version to a
previous version with known security vulnerabilities.<br>
<br>
They also include a
<a class="body-link" href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
<a href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
(Titan M2, improving on
the previous generation
<a class="body-link" href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
<a href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
which is extremely resistant to both
remote and physical attacks due to being completely
isolated from the rest of the system, including the
@ -302,29 +302,29 @@
cannot be remotely compromised by requiring the side
buttons of the device to be physically pressed for some
sensitive operations. Titan M2 also takes the role of
<a class="body-link" href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
<a href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
a
<a class="body-link" href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
<a href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
containing sensitive user
keys which are unavailable to the OS or apps running on
it without authorisation from Titan M2 itself.
<a class="body-link" href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack resistance</a>
<a href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack resistance</a>
ensures that Titan M2
firmware can be flashed only if the user PIN/password is
already known, making it impossible to backdoor the
device without already knowing these secrets.<br>
<br>
Google Pixel device kernels are compiled with
<a class="body-link" href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html">forward-edge control-flow integrity</a>
<a href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html">forward-edge control-flow integrity</a>
and
<a class="body-link" href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html">backward-edge control-flow integrity</a>
<a href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html">backward-edge control-flow integrity</a>
to prevent
code reuse attacks against the kernel. MAC address
randomisation is
<a class="body-link" href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.<br>
<a href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.<br>
<br>
Google releases
<a class="body-link" href="https://source.android.com/docs/security/bulletin/pixel/">guaranteed monthly security updates</a>,
<a href="https://source.android.com/docs/security/bulletin/pixel/">guaranteed monthly security updates</a>,
ensuring
Google Pixel devices are up-to-date and quickly
protected against security vulnerabilities.<br>
@ -335,39 +335,39 @@
ARM-based Titan M with RISC-V-based Titan M2, reducing
trust by removing ARM from the equation. Titan M2 is
more resiliant to attacks than Titan M, and is
<a class="body-link" href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf">AVA_VAN.5 certified</a>,
<a href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf">AVA_VAN.5 certified</a>,
the highest level of
vulnerability assessment. Google's in-house Tensor SoC
includes Tensor Security Core, further improving device
security.<br>
<br>
Pixel 6-series and 7-series devices are supported for a
<a class="body-link" href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-and-later">minimum of 5 years from launch</a>,
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-and-later">minimum of 5 years from launch</a>,
an increase from
previous generations'
<a class="body-link" href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-xl-a-a-g-and-a-g">support lifecycles of 3 years</a>.</td>
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-xl-a-a-g-and-a-g">support lifecycles of 3 years</a>.</td>
</tr>
</table>
</div>
<!-- Software I recommend as production software -->
<h3 id="software"><a href="#software" class="h3">Software</a></h3>
<h4 id="sfw-desktop"><a href="#sfw-desktop" class="h4">Desktop</a></h4>
<h3 id="software"><a href="#software">Software</a></h3>
<h4 id="sfw-desktop"><a href="#sfw-desktop">Desktop</a></h4>
<div style="overflow-x:auto;">
<table>
<tr>
<th class="table-title">Type</th>
<th class="table-title">Software</th>
<th class="table-title">Description</th>
<th class="table-title">Source model<br>
<th>Type</th>
<th>Software</th>
<th>Description</th>
<th>Source model<br>
<br>
(License - SPDX)</th>
</tr>
<tr>
<td class="table-main">Operating system</td>
<td class="table-main"><img src="asset/img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
<td>Operating system</td>
<td><img src="asset/img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
<br>
Gentoo Linux</td>
<td><a class="body-link" href="https://www.gentoo.org/">Gentoo Linux</a>
<td class="td-desc"><a href="https://www.gentoo.org/">Gentoo Linux</a>
is a highly modular, source-based,
Linux-based operating system which allows vast
customisation to tailor the operating system to suit
@ -382,59 +382,59 @@
hardening, placing performance below those aspects,
although my system is still very performant. Some of the
hardening I apply includes
<a class="body-link" href="https://en.wikipedia.org/wiki/Buffer_overflow_protection">stack protection</a>,
<a class="body-link" href="https://en.wikipedia.org/wiki/Integer_overflow">signed integer overflow wrapping</a>,
<a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection">stack protection</a>,
<a href="https://en.wikipedia.org/wiki/Integer_overflow">signed integer overflow wrapping</a>,
and GrapheneOS'
<a class="body-link" href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>
<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>
memory allocator.<br>
<br>
You can find Inferencium's Gentoo Linux configurations
in Inferencium's
<a class="body-link" href="https://src.inferencium.net/Inferencium/cfg/">configuration respository</a>.</td>
<td class="table-main">Open source<br>
<a href="https://src.inferencium.net/Inferencium/cfg/">configuration respository</a>.</td>
<td>Open source<br>
<br>
(GPL-2.0-only)</td>
</tr>
<tr>
<td class="table-main">Web browser</td>
<td class="table-main"><img src="asset/img/logo-chromium.png" width="100px" height="100px"/><br>
<td>Web browser</td>
<td><img src="asset/img/logo-chromium.png" width="100px" height="100px"/><br>
<br>
Chromium</td>
<td><a class="body-link" href="https://chromium.org/">Chromium</a>
<td class="td-desc"><a href="https://chromium.org/">Chromium</a>
is a highly secure web browser which is
often ahead of other web browsers in security aspects.
It has a dedicated security team and a very impressive
<a class="body-link" href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
<a href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
Chromium's security features include a strong
<a class="body-link" href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
<a href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
strong
<a class="body-link" href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
<a class="body-link" href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
<a href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
<a href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
memory hardening, and
<a class="body-link" href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.</td>
<td class="table-main">Open source<br>
<a href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.</td>
<td>Open source<br>
<br>
(BSD-3-Clause)</td>
</tr>
</table>
</div>
<h4 id="sfw-smartphone"><a href="#sfw-smartphone" class="h4">Smartphone</a></h4>
<h4 id="sfw-smartphone"><a href="#sfw-smartphone">Smartphone</a></h4>
<div style="overflow-x:auto;">
<table>
<tr>
<th class="table-title">Type</th>
<th class="table-title">Software</th>
<th class="table-title">Description</th>
<th class="table-title">Source model<br>
<th>Type</th>
<th>Software</th>
<th>Description</th>
<th>Source model<br>
<br>
(License - SPDX)</th>
</tr>
<tr>
<td class="table-main">Operating system</td>
<td class="table-main"><img src="asset/img/logo-grapheneos.png" width="100px" height="100px"/><br>
<td>Operating system</td>
<td><img src="asset/img/logo-grapheneos.png" width="100px" height="100px"/><br>
<br>
GrapheneOS</td>
<td><a class="body-link" href="https://grapheneos.org/">GrapheneOS</a>
<td class="td-desc"><a href="https://grapheneos.org/">GrapheneOS</a>
is a security-hardened,
privacy-hardened, secure-by-default, Android-based
operating system which implements extensive, systemic
@ -444,21 +444,21 @@
system information, a secure app spawning feature which
avoids sharing address space layout and other secrets
AOSP's default Zygote app spawning model would share,
<a class="body-link" href="https://github.com/GrapheneOS/kernel_gs-gs101/">hardened kernel</a>,
<a href="https://github.com/GrapheneOS/kernel_gs-gs101/">hardened kernel</a>,
hardened memory allocator
(<a class="body-link" href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>)
(<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>)
to protect against common memory
corruption vulnerabilties,
<a class="body-link" href="https://github.com/GrapheneOS/platform_bionic/">hardened Bionic standard C library</a>,
<a class="body-link" href="https://github.com/GrapheneOS/platform_system_sepolicy/">stricter SELinux policies</a>,
<a href="https://github.com/GrapheneOS/platform_bionic/">hardened Bionic standard C library</a>,
<a href="https://github.com/GrapheneOS/platform_system_sepolicy/">stricter SELinux policies</a>,
and local and remote
hardware-backed attestation
(<a class="body-link" href="https://attestation.app/about/">Auditor</a>)
(<a href="https://attestation.app/about/">Auditor</a>)
to ensure the OS has not been corrupted or
tampered with.<br>
<br>
GrapheneOS only supports
<a class="body-link" href="https://grapheneos.org/faq#device-support">high security and well-supported devices</a>
<a href="https://grapheneos.org/faq#device-support">high security and well-supported devices</a>
which
receive full support from their manufacturers, including
firmware updates, long support lifecycles, secure
@ -466,56 +466,56 @@
<br>
For an extensive list of features GrapheneOS provides,
visit its
<a class="body-link" href="https://grapheneos.org/features/">official features list</a>
<a href="https://grapheneos.org/features/">official features list</a>
which provides extensive
documentation.</td>
<td class="table-main">Open source<br>
<td>Open source<br>
<br>
(MIT)</td>
</tr>
<tr>
<td class="table-main">Web browser</td>
<td class="table-main"><img src="asset/img/logo-vanadium.png" width="100px" height="100px"/><br>
<td>Web browser</td>
<td><img src="asset/img/logo-vanadium.png" width="100px" height="100px"/><br>
<br>
Vanadium</td>
<td>Vanadium is a security-hardened, privacy-hardened
<td class="td-desc">Vanadium is a security-hardened, privacy-hardened
Chromium-based web browser which utilises GrapheneOS'
operating system hardening to implement stronger
defenses to the already very secure Chromium web
browser. Its hardening alongside Chromium's base
security features includes
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0081-Implement-UI-for-JIT-site-settings.patch">disabling JavaScript just-in-time (JIT) compilation by default</a>,
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0051-stub-out-the-battery-status-API.patch">stubbing out the battery status API to prevent abuse of it</a>,
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0081-Implement-UI-for-JIT-site-settings.patch">disabling JavaScript just-in-time (JIT) compilation by default</a>,
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0051-stub-out-the-battery-status-API.patch">stubbing out the battery status API to prevent abuse of it</a>,
and
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0084-Toggle-for-navigating-external-URL-in-incognito.patch">always-on Incognito mode as an option</a>.<br>
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0084-Toggle-for-navigating-external-URL-in-incognito.patch">always-on Incognito mode as an option</a>.<br>
<br>
Vanadium's source code, including its Chromium patchset,
can be found in its
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/">official repository</a>.</td>
<td class="table-main">Open source<br>
<a href="https://github.com/GrapheneOS/Vanadium/">official repository</a>.</td>
<td>Open source<br>
<br>
(GPL-2.0-only)</td>
</tr>
<tr>
<td class="table-main">Messenger</td>
<td class="table-main"><img src="asset/img/logo-molly.png" width="100px" height="100px"><br>
<td>Messenger</td>
<td><img src="asset/img/logo-molly.png" width="100px" height="100px"><br>
<br>
Molly</td>
<td><a class="body-link" href="https://molly.im/">Molly</a>
<td class="td-desc"><a href="https://molly.im/">Molly</a>
is a security-hardened, privacy-hardened
<a class="body-link" href="https://signal.org/">Signal</a>
<a href="https://signal.org/">Signal</a>
client which hardens Signal by using a
variety of
<a class="body-link" href="https://github.com/mollyim/mollyim-android#features">unique features</a>,
<a href="https://github.com/mollyim/mollyim-android#features">unique features</a>,
allowing
<a class="body-link" href="https://github.com/mollyim/mollyim-android/wiki/Data-Encryption-At-Rest">locking the database when not in use</a>,
<a href="https://github.com/mollyim/mollyim-android/wiki/Data-Encryption-At-Rest">locking the database when not in use</a>,
and
<a class="body-link" href="https://github.com/mollyim/mollyim-android/blob/a81ff7d120adc9d427be17239107343146bad704/app/src/main/java/org/thoughtcrime/securesms/crypto/MasterSecretUtil.java#L91">utilising Android StrongBox</a>
<a href="https://github.com/mollyim/mollyim-android/blob/a81ff7d120adc9d427be17239107343146bad704/app/src/main/java/org/thoughtcrime/securesms/crypto/MasterSecretUtil.java#L91">utilising Android StrongBox</a>
to protect user keys
using the device's hardware security module.<br>
<br>
Molly is available in
<a class="body-link" href="https://github.com/mollyim/mollyim-android#free-and-open-source">2 flavours</a>:<br>
<a href="https://github.com/mollyim/mollyim-android#free-and-open-source">2 flavours</a>:<br>
<ul>
<li>Molly, which includes the same
proprietary Google code as Signal to
@ -526,21 +526,21 @@
entirely open-source client.</li>
</ul>
</td>
<td class="table-main">Open source<br>
<td>Open source<br>
<br>
(GPL-3.0-only)</td>
</tr>
<tr>
<td class="table-main">Messenger</td>
<td class="table-main"><img src="asset/img/logo-conversations.png" width="100px" height="100px"><br>
<td>Messenger</td>
<td><img src="asset/img/logo-conversations.png" width="100px" height="100px"><br>
<br>
Conversations</td>
<td><a class="body-link" href="https://conversations.im/">Conversations</a>
<td class="td-desc"><a href="https://conversations.im/">Conversations</a>
is a well-designed Android
<a class="body-link" href="https://xmpp.org/">XMPP</a>
<a href="https://xmpp.org/">XMPP</a>
client which serves as the de facto XMPP
reference client and has great usability.</td>
<td class="table-main">Open source<br>
<td>Open source<br>
<br>
(GPL-3.0-only)</td>
</tr>
@ -548,9 +548,9 @@
</div>
</section>
<section id="music">
<h3 id="music"><a href="#music" class="h3">Music</a></h3>
<h3 id="music"><a href="#music">Music</a></h3>
<p>For a curated list of music I enjoy, visit my
<a href="music.html" class="body-link">music page</a>.</p>
<a href="music.html">music page</a>.</p>
</section>
</body>
</html>