Update About webpage from version 5.1.1.98 to 5.2.0.100
This commit is contained in:
parent
a366572d39
commit
1b6550529d
276
about.html
276
about.html
@ -5,7 +5,7 @@
|
||||
<!-- Copyright 2022 Jake Winters -->
|
||||
<!-- SPDX-License-Identifier: BSD-3-Clause -->
|
||||
|
||||
<!-- Version: 5.1.1.98 -->
|
||||
<!-- Version: 5.2.0.100 -->
|
||||
|
||||
|
||||
<html>
|
||||
@ -31,54 +31,54 @@
|
||||
<h1>About</h1>
|
||||
<section id="toc">
|
||||
<!-- Table of contents -->
|
||||
<h2 id="toc"><a href="#toc" class="h2">Table of Contents<a/></h2>
|
||||
<h2 id="toc"><a href="#toc">Table of Contents<a/></h2>
|
||||
<ul>
|
||||
<li><a href="#about_me" class="body-link">About Me</a></li>
|
||||
<li><a href="#licensing" class="body-link">Licensing</a></li>
|
||||
<li><a href="#about_me">About Me</a></li>
|
||||
<li><a href="#licensing">Licensing</a></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-preferred" class="body-link">Preferred</a></li>
|
||||
<li><a href="#licensing-preferred">Preferred</a></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-preferred-code" class="body-link">Code<a/></li>
|
||||
<li><a href="#licensing-preferred-code">Code<a/></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-bsd-3-clause-clear" class="body-link">BSD 3-Clause Clear License</a></li>
|
||||
<li><a href="#licensing-mit" class="body-link">MIT License</a></li>
|
||||
<li><a href="#licensing-gpl-2.0" class="body-link">GNU General Public License v2.0</a></li>
|
||||
<li><a href="#licensing-bsd-3-clause-clear">BSD 3-Clause Clear License</a></li>
|
||||
<li><a href="#licensing-mit">MIT License</a></li>
|
||||
<li><a href="#licensing-gpl-2.0">GNU General Public License v2.0</a></li>
|
||||
</ul>
|
||||
<li><a href="#licensing-preferred-non-code" class="body-link">Non-code</a></li>
|
||||
<li><a href="#licensing-preferred-non-code">Non-code</a></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-cc-by-4.0" class="body-link">Creative Commons Attribution 4.0 International</a></li>
|
||||
<li><a href="#licensing-cc-by-4.0">Creative Commons Attribution 4.0 International</a></li>
|
||||
</ul>
|
||||
</ul>
|
||||
<li><a href="#licensing-other" class="body-link">Other</a></li>
|
||||
<li><a href="#licensing-other">Other</a></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-other-code" class="body-link">Code</a></li>
|
||||
<li><a href="#licensing-other-code">Code</a></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-gpl-3.0" class="body-link">GNU General Public License v3.0</a></li>
|
||||
<li><a href="#licensing-gpl-3.0">GNU General Public License v3.0</a></li>
|
||||
</ul>
|
||||
<li><a href="#licensing-other-non-code" class="body-link">Non-code</a></li>
|
||||
<li><a href="#licensing-other-non-code">Non-code</a></li>
|
||||
<ul>
|
||||
<li><a href="#licensing-cc-by-nc-4.0" class="body-link">Creative Commons Attribution Non Commercial 4.0 International</a></li>
|
||||
<li><a href="#licensing-cc-by-nc-4.0">Creative Commons Attribution Non Commercial 4.0 International</a></li>
|
||||
</ul>
|
||||
</ul>
|
||||
</ul>
|
||||
<li><a href="#recommendations" class="body-link">Recommendations</a></li>
|
||||
<li><a href="#recommendations">Recommendations</a></li>
|
||||
<ul>
|
||||
<li><a href="#hardware" class="body-link">Hardware</a></li>
|
||||
<li><a href="#hardware">Hardware</a></li>
|
||||
<ul>
|
||||
<li><a href="#hdw-smartphone" class="body-link">Smartphone</a></li>
|
||||
<li><a href="#hdw-smartphone">Smartphone</a></li>
|
||||
</ul>
|
||||
<li><a href="#software" class="body-link">Software</a></li>
|
||||
<li><a href="#software">Software</a></li>
|
||||
<ul>
|
||||
<li><a href="#sfw-desktop" class="body-link">Desktop</a></li>
|
||||
<li><a href="#sfw-smartphone" class="body-link">Smartphone</a></li>
|
||||
<li><a href="#sfw-desktop">Desktop</a></li>
|
||||
<li><a href="#sfw-smartphone">Smartphone</a></li>
|
||||
</ul>
|
||||
<li><a href="#music" class="body-link">Music</a></li>
|
||||
<li><a href="#music">Music</a></li>
|
||||
</ul>
|
||||
</ul>
|
||||
</section>
|
||||
<section id="about_me">
|
||||
<!-- About me -->
|
||||
<h2 id="about_me"><a href="#about_me" class="h2">About Me</a></h2>
|
||||
<h2 id="about_me"><a href="#about_me">About Me</a></h2>
|
||||
<p>I am Jake Winters, also known by my pseudonym "Inference", a cybersecurity researcher
|
||||
based in United Kingdom.<br>
|
||||
I am the founder, lead developer, and administrator, of Inferencium.<br>
|
||||
@ -96,14 +96,14 @@
|
||||
I am also a modular design advocate for the ability to securely and robustly make
|
||||
changes to hardware and software without the entire system being affected.</p>
|
||||
<p>If you want to contact me for any reason, you can use my
|
||||
<a href="https://inferencium.net/contact.html" class="body-link">contact methods</a>.</p>
|
||||
<a href="https://inferencium.net/contact.html">contact methods</a>.</p>
|
||||
<p>I run the public Systems Hardening XMPP channel dedicated to systems security and
|
||||
privacy hardening at <code>sys-hardening@muc.xmpp.inferencium.net</code>, and its
|
||||
respective off-topic channel at
|
||||
<code>sys-hardening-ot@muc.xmpp.inferencium.net</code>.</p>
|
||||
</section>
|
||||
<section id="licensing">
|
||||
<h2 id="licensing"><a href="#licensing" class="h2">Licensing</a></h2>
|
||||
<h2 id="licensing"><a href="#licensing">Licensing</a></h2>
|
||||
<p>Inferencium cares about upstreaming and sharing code, strongly preferring licenses which
|
||||
have high license compatibility in order to permit sharing code with as many other projects
|
||||
as possible; for this reason, permissive licenses are our preferred choice, while avoiding
|
||||
@ -114,18 +114,18 @@
|
||||
infeasible to do so. Our goal is to share code which has the least amount of restrictions as
|
||||
possible, to allow wider propagation of our code and allow more use cases and possibilities,
|
||||
as well as ensuring proprietary code, whenever required, is permitted to be included.</p>
|
||||
<p><a href="https://iso.org/standard/81870.html" class="body-link">ISO 5962:2021</a>
|
||||
<p><a href="https://iso.org/standard/81870.html">ISO 5962:2021</a>
|
||||
is used for licensing, in the format
|
||||
<code>SPDX-License-Identifier: <license></code>; see the
|
||||
<a href="https://spdx.org/licenses/" class="body-link">SPDX license list</a>
|
||||
<a href="https://spdx.org/licenses/">SPDX license list</a>
|
||||
for the full list of available licenses under this standard.</p>
|
||||
<h3 id="licensing-preferred"><a href="#licensing-preferred" class="h3">Preferred</a></h3>
|
||||
<h4 id="licensing-preferred-code"><a href="#licensing-preferred-code" class="h4">Code</a></h4>
|
||||
<h5 id="licensing-bsd-3-clause-clear"><a href="#licensing-bsd-3-clause-clear" class="h5">BSD 3-Clause Clear License</a></h5>
|
||||
<h3 id="licensing-preferred"><a href="#licensing-preferred">Preferred</a></h3>
|
||||
<h4 id="licensing-preferred-code"><a href="#licensing-preferred-code">Code</a></h4>
|
||||
<h5 id="licensing-bsd-3-clause-clear"><a href="#licensing-bsd-3-clause-clear">BSD 3-Clause Clear License</a></h5>
|
||||
<code>SPDX-License-Identifier: BSD-3-Clause-Clear</code>
|
||||
<p>Type: Permissive</p>
|
||||
<br>
|
||||
<p><a href="https://spdx.org/licenses/BSD-3-Clause-Clear.html" class="body-link">BSD 3-Clause Clear License</a>
|
||||
<p><a href="https://spdx.org/licenses/BSD-3-Clause-Clear.html">BSD 3-Clause Clear License</a>
|
||||
is a highly permissive
|
||||
license which allows content licensed under it to be
|
||||
used in any way, whether in source or binary form, and
|
||||
@ -136,7 +136,7 @@
|
||||
and/or its contributors may not be used to endorse or
|
||||
promote products derived from the original project.<br>
|
||||
BSD 3-Clause Clear License is a derivative of
|
||||
<a href="https://spdx.org/licenses/BSD-3-Clause.html" class="body-link">BSD 3-Clause "New" or "Revised" License</a>,
|
||||
<a href="https://spdx.org/licenses/BSD-3-Clause.html">BSD 3-Clause "New" or "Revised" License</a>,
|
||||
which adds
|
||||
an explicit statement clarifying that patent rights are
|
||||
not granted by the license alone, and must be granted
|
||||
@ -147,11 +147,11 @@
|
||||
in regards to patents applied to code using the BSD
|
||||
3-Clause "New" or "Revised" License.</p>
|
||||
<br>
|
||||
<h5 id="licensing-mit"><a href="#licensing-mit" class="h5">MIT License</a></h5>
|
||||
<h5 id="licensing-mit"><a href="#licensing-mit">MIT License</a></h5>
|
||||
<code>SPDX-License-Identifier: MIT</code>
|
||||
<p>Type: Permissive</p>
|
||||
<br>
|
||||
<p><a href="https://spdx.org/licenses/MIT.html" class="body-link">MIT License</a>
|
||||
<p><a href="https://spdx.org/licenses/MIT.html">MIT License</a>
|
||||
is a highly permissive license which
|
||||
allows content licensed under it to be used in any way,
|
||||
whether in source or binary form, and allows
|
||||
@ -165,16 +165,16 @@
|
||||
explicit statement is made alongside this license,
|
||||
increasing complexity and deviating from the standard
|
||||
license text, we prefer
|
||||
<a href="#licensing-bsd-3-clause-clear" class="body-link">BSD 3-Clause Clear License</a>;
|
||||
<a href="#licensing-bsd-3-clause-clear">BSD 3-Clause Clear License</a>;
|
||||
however, MIT License is
|
||||
a great choice when derivatives using the name of the
|
||||
original project and/or its contributors is a non-issue.</p>
|
||||
<br>
|
||||
<h5 id="licensing-gpl-2.0"><a href="#licensing-gpl-2.0" class="h5">GNU General Public License v2.0</a></h5>
|
||||
<h5 id="licensing-gpl-2.0"><a href="#licensing-gpl-2.0">GNU General Public License v2.0</a></h5>
|
||||
<code>SPDX-License-Identifier: GPL-2.0-only</code>
|
||||
<p>Type: Copyleft</p>
|
||||
<br>
|
||||
<p><a href="https://spdx.org/licenses/GPL-2.0-only.html" class="body-link">GNU General Public License v2.0</a>
|
||||
<p><a href="https://spdx.org/licenses/GPL-2.0-only.html">GNU General Public License v2.0</a>
|
||||
is a strong
|
||||
copyleft license which restricts use of content licensed
|
||||
under it by requiring all source code of the content to
|
||||
@ -191,17 +191,17 @@
|
||||
beneficial to Inferencium code; whenever this is the
|
||||
case, the GNU General Public License v2.0 will be used,
|
||||
rather than the more restrictive
|
||||
<a href="#licensing-gpl-3.0" class="body-link">GNU General Public License v3.0</a>,
|
||||
<a href="#licensing-gpl-3.0">GNU General Public License v3.0</a>,
|
||||
and relicensing
|
||||
derivatives under the GNU General Public License v3.0
|
||||
will be disallowed.</p>
|
||||
<br>
|
||||
<h4 id="licensing-preferred-non-code"><a href="#licensing-preferred-non-code" class="h4">Non-code</a></h4>
|
||||
<h5 id="licensing-cc-by-4.0"><a href="#licensing-cc-by-4.0" class="h5">Creative Commons Attribution 4.0 International</a></h5>
|
||||
<h4 id="licensing-preferred-non-code"><a href="#licensing-preferred-non-code">Non-code</a></h4>
|
||||
<h5 id="licensing-cc-by-4.0"><a href="#licensing-cc-by-4.0">Creative Commons Attribution 4.0 International</a></h5>
|
||||
<code>SPDX-License-Identifier: CC-BY-4.0</code>
|
||||
<p>Type: Permissive</p>
|
||||
<br>
|
||||
<p><a href="https://spdx.org/licenses/CC-BY-4.0.html" class="body-link">Creative Commons Attribution 4.0 International</a>
|
||||
<p><a href="https://spdx.org/licenses/CC-BY-4.0.html">Creative Commons Attribution 4.0 International</a>
|
||||
is a
|
||||
highly permissive license which allows content licensed
|
||||
under it to be used in any way, in any medium, with the
|
||||
@ -209,13 +209,13 @@
|
||||
must be kept in order to attribute the original creator
|
||||
of the licensed content.</p>
|
||||
<br>
|
||||
<h3 id="licensing-other"><a href="#licensing-other" class="h2">Other</a></h3>
|
||||
<h4 id="licensing-other-code"><a href="#licensing-other-code" class="h4">Code</a></h4>
|
||||
<h5 id="licensing-gpl-3.0"><a href="#licensing-gpl-3.0" class="h5">GNU General Public License v3.0</a></h5>
|
||||
<h3 id="licensing-other"><a href="#licensing-other">Other</a></h3>
|
||||
<h4 id="licensing-other-code"><a href="#licensing-other-code">Code</a></h4>
|
||||
<h5 id="licensing-gpl-3.0"><a href="#licensing-gpl-3.0">GNU General Public License v3.0</a></h5>
|
||||
<code>SPDX-License-Identifier: GPL-3.0-only</code>
|
||||
<p>Type: Copyleft</p>
|
||||
<br>
|
||||
<p><a href="https://spdx.org/licenses/GPL-3.0-only.html" class="body-link">GNU General Public License v3.0</a>
|
||||
<p><a href="https://spdx.org/licenses/GPL-3.0-only.html">GNU General Public License v3.0</a>
|
||||
is a strong
|
||||
copyleft license which restricts usage of content
|
||||
licensed under it by requiring all source code of the
|
||||
@ -236,12 +236,12 @@
|
||||
only on specific systems, further restricting usage of
|
||||
Inferencium code, it is avoided completely.</p>
|
||||
<br>
|
||||
<h4 id="licensing-other-non-code"><a href="#licensing-other-non-code" class="h4">Non-code</a></h4>
|
||||
<h5 id="licensing-cc-by-nc-4.0"><a href="#licensing-cc-by-nc-4.0" class="h5">Creative Commons Attribution Non Commerical 4.0 International</a></h5>
|
||||
<h4 id="licensing-other-non-code"><a href="#licensing-other-non-code">Non-code</a></h4>
|
||||
<h5 id="licensing-cc-by-nc-4.0"><a href="#licensing-cc-by-nc-4.0">Creative Commons Attribution Non Commerical 4.0 International</a></h5>
|
||||
<code>SPDX-License-Identifier: CC-BY-NC-4.0</code>
|
||||
<p>Type: Permissive non-commercial</p>
|
||||
<br>
|
||||
<p><a href="https://spdx.org/licenses/CC-BY-NC-4.0.html" class="body-link">Creative Commons Attribution Non Commercial 4.0 International</a>
|
||||
<p><a href="https://spdx.org/licenses/CC-BY-NC-4.0.html">Creative Commons Attribution Non Commercial 4.0 International</a>
|
||||
is a permissive license which allows
|
||||
content licensed under it to be used in any way, in any
|
||||
medium, with the restrictions being commercial usage is
|
||||
@ -254,47 +254,47 @@
|
||||
not want to prevent, it is avoided completely.</p>
|
||||
</section>
|
||||
<section id="recommendations">
|
||||
<h2 id="recommendations"><a href="#recommendations" class="h2">Recommendations</a></h2>
|
||||
<h2 id="recommendations"><a href="#recommendations">Recommendations</a></h2>
|
||||
<!-- Hardware I recommend as production hardware -->
|
||||
<h3 id="hardware"><a href="#hardware" class="h3">Hardware</a></h3>
|
||||
<h4 id="hdw-smartphone"><a href="#hdw-smartphone" class="h4">Smartphone</a></h4>
|
||||
<h3 id="hardware"><a href="#hardware">Hardware</a></h3>
|
||||
<h4 id="hdw-smartphone"><a href="#hdw-smartphone">Smartphone</a></h4>
|
||||
<div style="overflow-x:auto;">
|
||||
<table>
|
||||
<tr>
|
||||
<th class="table-title">Type</th>
|
||||
<th class="table-title">Hardware</th>
|
||||
<th class="table-title">Description</th>
|
||||
<th class="table-title">Source model<br>
|
||||
<th>Type</th>
|
||||
<th>Hardware</th>
|
||||
<th>Description</th>
|
||||
<th>Source model<br>
|
||||
<br>
|
||||
(License - SPDX)</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Smartphone</td>
|
||||
<td class="table-main"><img src="asset/img/google-pixel_6.png" width="100px" height="100px"/><br>
|
||||
<td>Smartphone</td>
|
||||
<td><img src="asset/img/google-pixel_6.png" width="100px" height="100px"/><br>
|
||||
<br>
|
||||
Google Pixel</td>
|
||||
<td>Google Pixel devices are the best Android devices
|
||||
<td class="td-desc">Google Pixel devices are the best Android devices
|
||||
available on the market for
|
||||
<a class="body-link" href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">security and privacy</a>.<br>
|
||||
<a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">security and privacy</a>.<br>
|
||||
<br>
|
||||
They allow locking the bootloader with a
|
||||
<a class="body-link" href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later">custom Android Verified Boot (AVB) key</a>
|
||||
<a href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later">custom Android Verified Boot (AVB) key</a>
|
||||
in order to
|
||||
preserve security and privacy features when installing a
|
||||
custom operating system, such as
|
||||
<a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/">verified boot</a>
|
||||
<a href="https://source.android.com/docs/security/features/verifiedboot/">verified boot</a>
|
||||
which verifies that the OS has not
|
||||
been corrupted or tampered with, and
|
||||
<a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/verified-boot#rollback-protection">rollback protection</a>
|
||||
<a href="https://source.android.com/docs/security/features/verifiedboot/verified-boot#rollback-protection">rollback protection</a>
|
||||
which prevents an adversary
|
||||
from rolling back the OS or firmware version to a
|
||||
previous version with known security vulnerabilities.<br>
|
||||
<br>
|
||||
They also include a
|
||||
<a class="body-link" href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
|
||||
<a href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
|
||||
(Titan M2, improving on
|
||||
the previous generation
|
||||
<a class="body-link" href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
|
||||
<a href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
|
||||
which is extremely resistant to both
|
||||
remote and physical attacks due to being completely
|
||||
isolated from the rest of the system, including the
|
||||
@ -302,29 +302,29 @@
|
||||
cannot be remotely compromised by requiring the side
|
||||
buttons of the device to be physically pressed for some
|
||||
sensitive operations. Titan M2 also takes the role of
|
||||
<a class="body-link" href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
|
||||
<a href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
|
||||
a
|
||||
<a class="body-link" href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
|
||||
<a href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
|
||||
containing sensitive user
|
||||
keys which are unavailable to the OS or apps running on
|
||||
it without authorisation from Titan M2 itself.
|
||||
<a class="body-link" href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack resistance</a>
|
||||
<a href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack resistance</a>
|
||||
ensures that Titan M2
|
||||
firmware can be flashed only if the user PIN/password is
|
||||
already known, making it impossible to backdoor the
|
||||
device without already knowing these secrets.<br>
|
||||
<br>
|
||||
Google Pixel device kernels are compiled with
|
||||
<a class="body-link" href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html">forward-edge control-flow integrity</a>
|
||||
<a href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html">forward-edge control-flow integrity</a>
|
||||
and
|
||||
<a class="body-link" href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html">backward-edge control-flow integrity</a>
|
||||
<a href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html">backward-edge control-flow integrity</a>
|
||||
to prevent
|
||||
code reuse attacks against the kernel. MAC address
|
||||
randomisation is
|
||||
<a class="body-link" href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.<br>
|
||||
<a href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.<br>
|
||||
<br>
|
||||
Google releases
|
||||
<a class="body-link" href="https://source.android.com/docs/security/bulletin/pixel/">guaranteed monthly security updates</a>,
|
||||
<a href="https://source.android.com/docs/security/bulletin/pixel/">guaranteed monthly security updates</a>,
|
||||
ensuring
|
||||
Google Pixel devices are up-to-date and quickly
|
||||
protected against security vulnerabilities.<br>
|
||||
@ -335,39 +335,39 @@
|
||||
ARM-based Titan M with RISC-V-based Titan M2, reducing
|
||||
trust by removing ARM from the equation. Titan M2 is
|
||||
more resiliant to attacks than Titan M, and is
|
||||
<a class="body-link" href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf">AVA_VAN.5 certified</a>,
|
||||
<a href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf">AVA_VAN.5 certified</a>,
|
||||
the highest level of
|
||||
vulnerability assessment. Google's in-house Tensor SoC
|
||||
includes Tensor Security Core, further improving device
|
||||
security.<br>
|
||||
<br>
|
||||
Pixel 6-series and 7-series devices are supported for a
|
||||
<a class="body-link" href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-and-later">minimum of 5 years from launch</a>,
|
||||
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-and-later">minimum of 5 years from launch</a>,
|
||||
an increase from
|
||||
previous generations'
|
||||
<a class="body-link" href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-xl-a-a-g-and-a-g">support lifecycles of 3 years</a>.</td>
|
||||
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-xl-a-a-g-and-a-g">support lifecycles of 3 years</a>.</td>
|
||||
</tr>
|
||||
</table>
|
||||
</div>
|
||||
<!-- Software I recommend as production software -->
|
||||
<h3 id="software"><a href="#software" class="h3">Software</a></h3>
|
||||
<h4 id="sfw-desktop"><a href="#sfw-desktop" class="h4">Desktop</a></h4>
|
||||
<h3 id="software"><a href="#software">Software</a></h3>
|
||||
<h4 id="sfw-desktop"><a href="#sfw-desktop">Desktop</a></h4>
|
||||
<div style="overflow-x:auto;">
|
||||
<table>
|
||||
<tr>
|
||||
<th class="table-title">Type</th>
|
||||
<th class="table-title">Software</th>
|
||||
<th class="table-title">Description</th>
|
||||
<th class="table-title">Source model<br>
|
||||
<th>Type</th>
|
||||
<th>Software</th>
|
||||
<th>Description</th>
|
||||
<th>Source model<br>
|
||||
<br>
|
||||
(License - SPDX)</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Operating system</td>
|
||||
<td class="table-main"><img src="asset/img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
|
||||
<td>Operating system</td>
|
||||
<td><img src="asset/img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
|
||||
<br>
|
||||
Gentoo Linux</td>
|
||||
<td><a class="body-link" href="https://www.gentoo.org/">Gentoo Linux</a>
|
||||
<td class="td-desc"><a href="https://www.gentoo.org/">Gentoo Linux</a>
|
||||
is a highly modular, source-based,
|
||||
Linux-based operating system which allows vast
|
||||
customisation to tailor the operating system to suit
|
||||
@ -382,59 +382,59 @@
|
||||
hardening, placing performance below those aspects,
|
||||
although my system is still very performant. Some of the
|
||||
hardening I apply includes
|
||||
<a class="body-link" href="https://en.wikipedia.org/wiki/Buffer_overflow_protection">stack protection</a>,
|
||||
<a class="body-link" href="https://en.wikipedia.org/wiki/Integer_overflow">signed integer overflow wrapping</a>,
|
||||
<a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection">stack protection</a>,
|
||||
<a href="https://en.wikipedia.org/wiki/Integer_overflow">signed integer overflow wrapping</a>,
|
||||
and GrapheneOS'
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>
|
||||
<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>
|
||||
memory allocator.<br>
|
||||
<br>
|
||||
You can find Inferencium's Gentoo Linux configurations
|
||||
in Inferencium's
|
||||
<a class="body-link" href="https://src.inferencium.net/Inferencium/cfg/">configuration respository</a>.</td>
|
||||
<td class="table-main">Open source<br>
|
||||
<a href="https://src.inferencium.net/Inferencium/cfg/">configuration respository</a>.</td>
|
||||
<td>Open source<br>
|
||||
<br>
|
||||
(GPL-2.0-only)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Web browser</td>
|
||||
<td class="table-main"><img src="asset/img/logo-chromium.png" width="100px" height="100px"/><br>
|
||||
<td>Web browser</td>
|
||||
<td><img src="asset/img/logo-chromium.png" width="100px" height="100px"/><br>
|
||||
<br>
|
||||
Chromium</td>
|
||||
<td><a class="body-link" href="https://chromium.org/">Chromium</a>
|
||||
<td class="td-desc"><a href="https://chromium.org/">Chromium</a>
|
||||
is a highly secure web browser which is
|
||||
often ahead of other web browsers in security aspects.
|
||||
It has a dedicated security team and a very impressive
|
||||
<a class="body-link" href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
|
||||
<a href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
|
||||
Chromium's security features include a strong
|
||||
<a class="body-link" href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
|
||||
<a href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
|
||||
strong
|
||||
<a class="body-link" href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
|
||||
<a class="body-link" href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
|
||||
<a href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
|
||||
<a href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
|
||||
memory hardening, and
|
||||
<a class="body-link" href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.</td>
|
||||
<td class="table-main">Open source<br>
|
||||
<a href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.</td>
|
||||
<td>Open source<br>
|
||||
<br>
|
||||
(BSD-3-Clause)</td>
|
||||
</tr>
|
||||
</table>
|
||||
</div>
|
||||
<h4 id="sfw-smartphone"><a href="#sfw-smartphone" class="h4">Smartphone</a></h4>
|
||||
<h4 id="sfw-smartphone"><a href="#sfw-smartphone">Smartphone</a></h4>
|
||||
<div style="overflow-x:auto;">
|
||||
<table>
|
||||
<tr>
|
||||
<th class="table-title">Type</th>
|
||||
<th class="table-title">Software</th>
|
||||
<th class="table-title">Description</th>
|
||||
<th class="table-title">Source model<br>
|
||||
<th>Type</th>
|
||||
<th>Software</th>
|
||||
<th>Description</th>
|
||||
<th>Source model<br>
|
||||
<br>
|
||||
(License - SPDX)</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Operating system</td>
|
||||
<td class="table-main"><img src="asset/img/logo-grapheneos.png" width="100px" height="100px"/><br>
|
||||
<td>Operating system</td>
|
||||
<td><img src="asset/img/logo-grapheneos.png" width="100px" height="100px"/><br>
|
||||
<br>
|
||||
GrapheneOS</td>
|
||||
<td><a class="body-link" href="https://grapheneos.org/">GrapheneOS</a>
|
||||
<td class="td-desc"><a href="https://grapheneos.org/">GrapheneOS</a>
|
||||
is a security-hardened,
|
||||
privacy-hardened, secure-by-default, Android-based
|
||||
operating system which implements extensive, systemic
|
||||
@ -444,21 +444,21 @@
|
||||
system information, a secure app spawning feature which
|
||||
avoids sharing address space layout and other secrets
|
||||
AOSP's default Zygote app spawning model would share,
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/kernel_gs-gs101/">hardened kernel</a>,
|
||||
<a href="https://github.com/GrapheneOS/kernel_gs-gs101/">hardened kernel</a>,
|
||||
hardened memory allocator
|
||||
(<a class="body-link" href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>)
|
||||
(<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>)
|
||||
to protect against common memory
|
||||
corruption vulnerabilties,
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/platform_bionic/">hardened Bionic standard C library</a>,
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/platform_system_sepolicy/">stricter SELinux policies</a>,
|
||||
<a href="https://github.com/GrapheneOS/platform_bionic/">hardened Bionic standard C library</a>,
|
||||
<a href="https://github.com/GrapheneOS/platform_system_sepolicy/">stricter SELinux policies</a>,
|
||||
and local and remote
|
||||
hardware-backed attestation
|
||||
(<a class="body-link" href="https://attestation.app/about/">Auditor</a>)
|
||||
(<a href="https://attestation.app/about/">Auditor</a>)
|
||||
to ensure the OS has not been corrupted or
|
||||
tampered with.<br>
|
||||
<br>
|
||||
GrapheneOS only supports
|
||||
<a class="body-link" href="https://grapheneos.org/faq#device-support">high security and well-supported devices</a>
|
||||
<a href="https://grapheneos.org/faq#device-support">high security and well-supported devices</a>
|
||||
which
|
||||
receive full support from their manufacturers, including
|
||||
firmware updates, long support lifecycles, secure
|
||||
@ -466,56 +466,56 @@
|
||||
<br>
|
||||
For an extensive list of features GrapheneOS provides,
|
||||
visit its
|
||||
<a class="body-link" href="https://grapheneos.org/features/">official features list</a>
|
||||
<a href="https://grapheneos.org/features/">official features list</a>
|
||||
which provides extensive
|
||||
documentation.</td>
|
||||
<td class="table-main">Open source<br>
|
||||
<td>Open source<br>
|
||||
<br>
|
||||
(MIT)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Web browser</td>
|
||||
<td class="table-main"><img src="asset/img/logo-vanadium.png" width="100px" height="100px"/><br>
|
||||
<td>Web browser</td>
|
||||
<td><img src="asset/img/logo-vanadium.png" width="100px" height="100px"/><br>
|
||||
<br>
|
||||
Vanadium</td>
|
||||
<td>Vanadium is a security-hardened, privacy-hardened
|
||||
<td class="td-desc">Vanadium is a security-hardened, privacy-hardened
|
||||
Chromium-based web browser which utilises GrapheneOS'
|
||||
operating system hardening to implement stronger
|
||||
defenses to the already very secure Chromium web
|
||||
browser. Its hardening alongside Chromium's base
|
||||
security features includes
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0081-Implement-UI-for-JIT-site-settings.patch">disabling JavaScript just-in-time (JIT) compilation by default</a>,
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0051-stub-out-the-battery-status-API.patch">stubbing out the battery status API to prevent abuse of it</a>,
|
||||
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0081-Implement-UI-for-JIT-site-settings.patch">disabling JavaScript just-in-time (JIT) compilation by default</a>,
|
||||
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0051-stub-out-the-battery-status-API.patch">stubbing out the battery status API to prevent abuse of it</a>,
|
||||
and
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0084-Toggle-for-navigating-external-URL-in-incognito.patch">always-on Incognito mode as an option</a>.<br>
|
||||
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0084-Toggle-for-navigating-external-URL-in-incognito.patch">always-on Incognito mode as an option</a>.<br>
|
||||
<br>
|
||||
Vanadium's source code, including its Chromium patchset,
|
||||
can be found in its
|
||||
<a class="body-link" href="https://github.com/GrapheneOS/Vanadium/">official repository</a>.</td>
|
||||
<td class="table-main">Open source<br>
|
||||
<a href="https://github.com/GrapheneOS/Vanadium/">official repository</a>.</td>
|
||||
<td>Open source<br>
|
||||
<br>
|
||||
(GPL-2.0-only)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Messenger</td>
|
||||
<td class="table-main"><img src="asset/img/logo-molly.png" width="100px" height="100px"><br>
|
||||
<td>Messenger</td>
|
||||
<td><img src="asset/img/logo-molly.png" width="100px" height="100px"><br>
|
||||
<br>
|
||||
Molly</td>
|
||||
<td><a class="body-link" href="https://molly.im/">Molly</a>
|
||||
<td class="td-desc"><a href="https://molly.im/">Molly</a>
|
||||
is a security-hardened, privacy-hardened
|
||||
<a class="body-link" href="https://signal.org/">Signal</a>
|
||||
<a href="https://signal.org/">Signal</a>
|
||||
client which hardens Signal by using a
|
||||
variety of
|
||||
<a class="body-link" href="https://github.com/mollyim/mollyim-android#features">unique features</a>,
|
||||
<a href="https://github.com/mollyim/mollyim-android#features">unique features</a>,
|
||||
allowing
|
||||
<a class="body-link" href="https://github.com/mollyim/mollyim-android/wiki/Data-Encryption-At-Rest">locking the database when not in use</a>,
|
||||
<a href="https://github.com/mollyim/mollyim-android/wiki/Data-Encryption-At-Rest">locking the database when not in use</a>,
|
||||
and
|
||||
<a class="body-link" href="https://github.com/mollyim/mollyim-android/blob/a81ff7d120adc9d427be17239107343146bad704/app/src/main/java/org/thoughtcrime/securesms/crypto/MasterSecretUtil.java#L91">utilising Android StrongBox</a>
|
||||
<a href="https://github.com/mollyim/mollyim-android/blob/a81ff7d120adc9d427be17239107343146bad704/app/src/main/java/org/thoughtcrime/securesms/crypto/MasterSecretUtil.java#L91">utilising Android StrongBox</a>
|
||||
to protect user keys
|
||||
using the device's hardware security module.<br>
|
||||
<br>
|
||||
Molly is available in
|
||||
<a class="body-link" href="https://github.com/mollyim/mollyim-android#free-and-open-source">2 flavours</a>:<br>
|
||||
<a href="https://github.com/mollyim/mollyim-android#free-and-open-source">2 flavours</a>:<br>
|
||||
<ul>
|
||||
<li>Molly, which includes the same
|
||||
proprietary Google code as Signal to
|
||||
@ -526,21 +526,21 @@
|
||||
entirely open-source client.</li>
|
||||
</ul>
|
||||
</td>
|
||||
<td class="table-main">Open source<br>
|
||||
<td>Open source<br>
|
||||
<br>
|
||||
(GPL-3.0-only)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="table-main">Messenger</td>
|
||||
<td class="table-main"><img src="asset/img/logo-conversations.png" width="100px" height="100px"><br>
|
||||
<td>Messenger</td>
|
||||
<td><img src="asset/img/logo-conversations.png" width="100px" height="100px"><br>
|
||||
<br>
|
||||
Conversations</td>
|
||||
<td><a class="body-link" href="https://conversations.im/">Conversations</a>
|
||||
<td class="td-desc"><a href="https://conversations.im/">Conversations</a>
|
||||
is a well-designed Android
|
||||
<a class="body-link" href="https://xmpp.org/">XMPP</a>
|
||||
<a href="https://xmpp.org/">XMPP</a>
|
||||
client which serves as the de facto XMPP
|
||||
reference client and has great usability.</td>
|
||||
<td class="table-main">Open source<br>
|
||||
<td>Open source<br>
|
||||
<br>
|
||||
(GPL-3.0-only)</td>
|
||||
</tr>
|
||||
@ -548,9 +548,9 @@
|
||||
</div>
|
||||
</section>
|
||||
<section id="music">
|
||||
<h3 id="music"><a href="#music" class="h3">Music</a></h3>
|
||||
<h3 id="music"><a href="#music">Music</a></h3>
|
||||
<p>For a curated list of music I enjoy, visit my
|
||||
<a href="music.html" class="body-link">music page</a>.</p>
|
||||
<a href="music.html">music page</a>.</p>
|
||||
</section>
|
||||
</body>
|
||||
</html>
|
||||
|
Loading…
x
Reference in New Issue
Block a user