Add web browsers to section Software I Use. Improve text.
This commit is contained in:
commit
a52bc7b5cb
59
about.html
59
about.html
@ -42,7 +42,8 @@
|
|||||||
<td>Type</td>
|
<td>Type</td>
|
||||||
<td>Software</td>
|
<td>Software</td>
|
||||||
<td>Description</td>
|
<td>Description</td>
|
||||||
<td>Source model (License)</td>
|
<td>Source model<br>
|
||||||
|
(License)</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Operating system</td>
|
<td>Operating system</td>
|
||||||
@ -53,18 +54,41 @@
|
|||||||
which allows vast customisation to tailor the operating system to suit your specific
|
which allows vast customisation to tailor the operating system to suit your specific
|
||||||
needs. There are many advantages to such an operating system, with the most notable
|
needs. There are many advantages to such an operating system, with the most notable
|
||||||
being the ability to optimise the software for security, privacy, performance,
|
being the ability to optimise the software for security, privacy, performance,
|
||||||
power usage; however, there are effectively unlimited other use cases, or a
|
or power usage; however, there are effectively unlimited other use cases, or a
|
||||||
combination of multiple use cases.<br>
|
combination of multiple use cases.<br>
|
||||||
I have focused on security hardening and privacy hardening, placing performance below
|
I have focused on security hardening and privacy hardening, placing performance below
|
||||||
those aspects, although my system is still very performant. Some of the hardening I
|
those aspects, although my system is still very performant. Some of the hardening I
|
||||||
apply includes stack protection, signed integer overflow wrapping, and GrapheneOS'
|
apply includes stack protection, signed integer overflow wrapping, and GrapheneOS'
|
||||||
hardened_malloc memory allocator.<br>
|
hardened_malloc memory allocator.<br>
|
||||||
|
<br>
|
||||||
You can find my personal Gentoo Linux hardening configuration
|
You can find my personal Gentoo Linux hardening configuration
|
||||||
<a class="table-link" href="https://git.inferencium.net/inference/cfg/">here</a>.</td>
|
<a class="table-link" href="https://git.inferencium.net/inference/cfg/">here</a>.</td>
|
||||||
<td>Open source<br>
|
<td>Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(GPLv2)</td>
|
(GPLv2-only)</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Web browser</td>
|
||||||
|
<td><img src="img/logo-chromium.png" width="100px" height="100px"/><br>
|
||||||
|
<br>
|
||||||
|
Chromium</td>
|
||||||
|
<td>Chromium is a highly secure web browser which is often ahead of other
|
||||||
|
web browsers in security aspects. It has a dedicated security team and a
|
||||||
|
very impressive
|
||||||
|
<a class="table-link" href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
|
||||||
|
Chromium's security features include a strong
|
||||||
|
<a class="table-link" href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
|
||||||
|
strong <a class="table-link" href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
|
||||||
|
<a class="table-link" href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
|
||||||
|
memory hardening, and
|
||||||
|
<a class="table-link" href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.<br>
|
||||||
|
<br>
|
||||||
|
You can learn more about Chromium by visiting its
|
||||||
|
<a class="table-link" href="https://www.chromium.org/Home/">official website</a>
|
||||||
|
which provides extensive documentation.</td>
|
||||||
|
<td>Open source<br>
|
||||||
|
<br>
|
||||||
|
(BSD 3-Clause)</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
<h4>Smartphone</h4>
|
<h4>Smartphone</h4>
|
||||||
@ -73,7 +97,9 @@
|
|||||||
<td>Type</td>
|
<td>Type</td>
|
||||||
<td>Software</td>
|
<td>Software</td>
|
||||||
<td>Description</td>
|
<td>Description</td>
|
||||||
<td>Source model (License)</td>
|
<td>Source model<br>
|
||||||
|
<br>
|
||||||
|
(License)</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Operating system</td>
|
<td>Operating system</td>
|
||||||
@ -90,14 +116,33 @@
|
|||||||
against common memory corruption vulnerabilties, hardened Bionic standard C library,
|
against common memory corruption vulnerabilties, hardened Bionic standard C library,
|
||||||
and local and remote hardware-backed attestation (Auditor) to ensure the OS has
|
and local and remote hardware-backed attestation (Auditor) to ensure the OS has
|
||||||
not been corrupted or tampered with. GrapheneOS only supports devices which receive
|
not been corrupted or tampered with. GrapheneOS only supports devices which receive
|
||||||
full support from their manufacturers, including firmware updates and device-specific
|
full support from their manufacturers, including firmware updates, long support
|
||||||
updates, long support lifecycles, secure hardware, and overall high security practices.<br>
|
lifecycles, secure hardware, and overall high security practices.<br>
|
||||||
|
<br>
|
||||||
For an extensive list of features GrapheneOS provides, visit its
|
For an extensive list of features GrapheneOS provides, visit its
|
||||||
<a class="table-link" href="https://grapheneos.org/">official website</a>.</td>
|
<a class="table-link" href="https://grapheneos.org/">official website</a>
|
||||||
|
which provides extensive documentation.</td>
|
||||||
<td>Open source<br>
|
<td>Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(MIT)</td>
|
(MIT)</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Web browser</td>
|
||||||
|
<td><img src="img/logo-vanadium.png" width="100px" height="100px"/><br>
|
||||||
|
<br>
|
||||||
|
Vanadium</td>
|
||||||
|
<td>Vanadium is a security-hardened, privacy-hardened Chromium-based web browser
|
||||||
|
which utilises GrapheneOS' operating system hardening to implement stronger
|
||||||
|
defenses to the already very secure Chromium web browser. Its hardening includes
|
||||||
|
disabling JavaScript just-in-time (JIT) compilation by default, stubbing out the
|
||||||
|
battery status API to prevent abuse of it, and always-on
|
||||||
|
Incognito mode as an option.<br>
|
||||||
|
<br>
|
||||||
|
Vanadium's source code repository, including its Chromium patchset, can be found
|
||||||
|
<a class="table-link" href="https://github.com/GrapheneOS/Vanadium/">here</a>.</td>
|
||||||
|
<td>Open source<br>
|
||||||
|
<br>
|
||||||
|
(GPLv2-only)</td>
|
||||||
</table>
|
</table>
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
|
BIN
img/logo-chromium.png
Normal file
BIN
img/logo-chromium.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 123 KiB |
BIN
img/logo-vanadium.png
Normal file
BIN
img/logo-vanadium.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 81 KiB |
@ -26,6 +26,7 @@
|
|||||||
<p>- <a class="body-link" href="https://git.inferencium.net/inference/cfg/">Configuration files</a></p>
|
<p>- <a class="body-link" href="https://git.inferencium.net/inference/cfg/">Configuration files</a></p>
|
||||||
<p>- <a class="body-link" href="https://git.inferencium.net/inference/scr/">Script files</a></p>
|
<p>- <a class="body-link" href="https://git.inferencium.net/inference/scr/">Script files</a></p>
|
||||||
<br>
|
<br>
|
||||||
|
<br>
|
||||||
<h3>Inferencium Network Source Code Repositories</h3>
|
<h3>Inferencium Network Source Code Repositories</h3>
|
||||||
<p>These repositories contain source code targeted towards a public release and
|
<p>These repositories contain source code targeted towards a public release and
|
||||||
are suitable for a wide range of systems.</p>
|
are suitable for a wide range of systems.</p>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user