Add table of contents. Indent code to match coding style.

This commit is contained in:
inference 2023-03-13 13:22:35 +00:00
parent 29c9dc7613
commit baecc51f96
Signed by: inference
SSH Key Fingerprint: SHA256:9Pl0nZ2UJacgm+IeEtLSZ4FOESgP1eKCtRflfPfdX9M

View File

@ -5,7 +5,7 @@
<!-- Copyright 2022-2023 Jake Winters --> <!-- Copyright 2022-2023 Jake Winters -->
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear --> <!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
<!-- Version: 3.0.0.12 --> <!-- Version: 3.1.0.13 -->
<html> <html>
@ -36,138 +36,162 @@
<br> <br>
<br> <br>
<h2>FOSS is Working Against Itself</h2> <h2>FOSS is Working Against Itself</h2>
<br> <br>
<p class="update_date">Posted: 2022-01-27 (UTC+00:00)</p> <p class="update_date">Posted: 2022-01-27 (UTC+00:00)</p>
<p class="update_date">Updated: 2022-11-09 (UTC+00:00)</p> <p class="update_date">Updated: 2022-11-09 (UTC+00:00)</p>
<br> <br>
<!-- Table of contents. -->
<h2 id="toc"><a href="#toc" class="h2"
>Table of Contents<a/></h2>
<ul>
<li><a href="#introduction" class="body-link"
>Introduction</a></li>
<li><a href="#examples" class="body-link"
>Examples</a></li>
<ul>
<li><a href="#example-smartphones" class="body-link"
>Smartphones</a></li>
</ul>
<li><a href="#solution" class="body-link"
>Solution</a></li>
<li><a href="#conclusion" class="body-link"
>Conclusion</a></li>
</ul>
<h4>Introduction</h4> <h4 id=introduction"><a href="#introduction" class="h4"
<p>The world has become a dangerous, privacy invading, human rights stripping, totalitarian place; >Introduction</a></h4>
in order to combat this, people are joining a growing, and dangerous, trend, which I will refer to <p>The world has become a dangerous, privacy invading, human rights stripping, totalitarian place;
in this post as the "Free and Open Source (FOSS) movement". With that stated, I will now debunk the in order to combat this, people are joining a growing, and dangerous, trend, which I will refer to
misinformation being spread inside of this extremely flawed movement.</p> in this post as the "Free and Open Source (FOSS) movement". With that stated, I will now debunk the
<br> misinformation being spread inside of this extremely flawed movement.</p>
<p>The <br>
<a class="body-link" href="https://en.wikipedia.org/wiki/Free_software" <p>The
>FOSS</a> movement is an attempt to regain <a class="body-link" href="https://en.wikipedia.org/wiki/Free_software"
<a class="body-link" href="https://en.wikipedia.org/wiki/Privacy" >FOSS</a> movement is an attempt to regain
>privacy</a> and <a class="body-link" href="https://en.wikipedia.org/wiki/Privacy"
<a class="body-link" href="https://en.wikipedia.org/wiki/Control_(psychology)" >privacy</a> and
>control</a> over our devices and data, but the entire concept of FOSS-only, at the current time, is <a class="body-link" href="https://en.wikipedia.org/wiki/Control_(psychology)"
severely, and dangerously, flawed. What the FOSS community does not seem to understand is the fact >control</a> over our devices and data, but the entire concept of FOSS-only, at the current time, is
that most FOSS software cares not about severely, and dangerously, flawed. What the FOSS community does not seem to understand is the fact
<a class="body-link" href="https://en.wikipedia.org/wiki/Security" that most FOSS software cares not about
>security</a>. <a class="body-link" href="https://en.wikipedia.org/wiki/Security"
"Security"; keep that word in mind as you progress through this article. What is security? Security >security</a>.
is being safe and secure from adversaries and unwanted consequences; security protects our rights "Security"; keep that word in mind as you progress through this article. What is security? Security
and allows us to protect ourselves. Without security, we have no protection, and without protection, is being safe and secure from adversaries and unwanted consequences; security protects our rights
we have a lack of certainty of everything else, including privacy and control, which is what the and allows us to protect ourselves. Without security, we have no protection, and without protection,
FOSS movement is seeking.</p> we have a lack of certainty of everything else, including privacy and control, which is what the
<br> FOSS movement is seeking.</p>
<p>FOSS projects rarely take security into account; they simply look at the surface level, rather <br>
than the actual <p>FOSS projects rarely take security into account; they simply look at the surface level, rather
<a class="body-link" href="https://en.wikipedia.org/wiki/Root_cause_analysis" than the actual
>root cause</a> of the issues they are attempting to fight against. In this case, the focus is on <a class="body-link" href="https://en.wikipedia.org/wiki/Root_cause_analysis"
privacy and control. Without security mechanisms to protect the privacy features and the ability to >root cause</a> of the issues they are attempting to fight against. In this case, the focus is on
control your devices and data, it can be stripped away as if it never existed in the first place, privacy and control. Without security mechanisms to protect the privacy features and the ability to
which, inevitably, leads us back to the beginning, and the cycle repeats. With this control your devices and data, it can be stripped away as if it never existed in the first place,
<a class="body-link" href="https://en.wikipedia.org/wiki/Ideology" which, inevitably, leads us back to the beginning, and the cycle repeats. With this
>ideology</a>, privacy and control will *never* be achieved. There is no foundation to build privacy <a class="body-link" href="https://en.wikipedia.org/wiki/Ideology"
or control upon. It is impossible to build a solid, freedom respecting platform on this model.</p> >ideology</a>, privacy and control will *never* be achieved. There is no foundation to build privacy
<br> or control upon. It is impossible to build a solid, freedom respecting platform on this model.</p>
<h4>Example: Smartphones</h4> <br>
<p>A FOSS phone, especially so-called
<a class="body-link" href="https://en.wikipedia.org/wiki/Linux_for_mobile_devices#Smartphones" <h4 id="examples"><a href="#examples" class="h4"
>"Linux phones"</a> are completely >Examples</a></h4>
detrimental to privacy and control, because they do not have the security necessary to enforce that <br>
privacy. <h5 id="example-smartphones"><a href="#example-smartphones"
<a class="body-link" href="https://en.wikipedia.org/wiki/Bootloader_unlocking" >Smartphones</a></h5>
>Unlocked bootloaders</a> prevent the device from <p>A FOSS phone, especially so-called
<a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/" <a class="body-link" href="https://en.wikipedia.org/wiki/Linux_for_mobile_devices#Smartphones"
>verifying the integrity of the boot chain</a>, including the OS, meaning any adversary, whether a >"Linux phones"</a> are completely
stranger who happens to pick up the device, or a big tech or government entity, can simply inject detrimental to privacy and control, because they do not have the security necessary to enforce that
malicious code into your software and you wouldn't have any idea it was there. If that's not enough privacy.
of a backdoor for you to reconsider your position, how about the trivial <a class="body-link" href="https://en.wikipedia.org/wiki/Bootloader_unlocking"
<a class="body-link" href="https://en.wikipedia.org/wiki/Evil_maid_attack" >Unlocked bootloaders</a> prevent the device from
>evil maid</a> and data extraction attacks which could be executed on your device, without coercion? <a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/"
With Android phones, this is bad enough to completely break the privacy and control the FOSS >verifying the integrity of the boot chain</a>, including the OS, meaning any adversary, whether a
movement seeks, but "Linux phones" take it a step further by implementing barely any security, if stranger who happens to pick up the device, or a big tech or government entity, can simply inject
any at all. malicious code into your software and you wouldn't have any idea it was there. If that's not enough
<a class="body-link" href="https://en.wikipedia.org/wiki/Privilege_escalation" of a backdoor for you to reconsider your position, how about the trivial
>Privilege escalation</a> is trivial to achieve on any Linux system, which is the reason Linux <a class="body-link" href="https://en.wikipedia.org/wiki/Evil_maid_attack"
<a class="body-link" href="https://en.wikipedia.org/wiki/Hardening_(computing)" >evil maid</a> and data extraction attacks which could be executed on your device, without coercion?
>hardening</a> strategies often include restricting access to the root account; if you With Android phones, this is bad enough to completely break the privacy and control the FOSS
<a class="body-link" href="https://en.wikipedia.org/wiki/Rooting_(Android)" movement seeks, but "Linux phones" take it a step further by implementing barely any security, if
>root your Android phone</a>, or use a "Linux phone", you've already destroyed the security model, any at all.
and thus privacy and control model you were attempting to achieve. Not only are these side effects <a class="body-link" href="https://en.wikipedia.org/wiki/Privilege_escalation"
of FOSS, so is the absolutely illogical restriction of not being able to, or making it unnecessarily >Privilege escalation</a> is trivial to achieve on any Linux system, which is the reason Linux
difficult to, install and update critical components of the system, such as proprietary <a class="body-link" href="https://en.wikipedia.org/wiki/Hardening_(computing)"
<a class="body-link" href="https://en.wikipedia.org/wiki/Firmware" >hardening</a> strategies often include restricting access to the root account; if you
>firmware</a>, which just so happens to be almost all of them. "Linux phones" are not as free as <a class="body-link" href="https://en.wikipedia.org/wiki/Rooting_(Android)"
they proclaim to be.</p> >root your Android phone</a>, or use a "Linux phone", you've already destroyed the security model,
<br> and thus privacy and control model you were attempting to achieve. Not only are these side effects
<p>You may ask "What's so bad about using of FOSS, so is the absolutely illogical restriction of not being able to, or making it unnecessarily
<a class="body-link" href="https://lineageos.org/" difficult to, install and update critical components of the system, such as proprietary
>LineageOS</a>?", to which I answer with "What's not bad about it?".<br> <a class="body-link" href="https://en.wikipedia.org/wiki/Firmware"
<br> >firmware</a>, which just so happens to be almost all of them. "Linux phones" are not as free as
- LineageOS uses they proclaim to be.</p>
<a class="body-link" href="https://github.com/LineageOS/hudson/blob/master/lineage-build-targets" <br>
>debug builds</a>, not safe and secure release builds.<br> <p>You may ask "What's so bad about using
- LineageOS requires an unlocked bootloader. Even when installed on devices which support custom <a class="body-link" href="https://lineageos.org/"
Android Verified Boot (AVB) keys, the bootloader cannot be locked due to lack of the OS being >LineageOS</a>?", to which I answer with "What's not bad about it?".<br>
signed.<br> <br>
- LineageOS does not install critically important firmware without manual flashing, requiring users - LineageOS uses
to perform a second update to install this firmware; this likely causes users to ignore the <a class="body-link" href="https://github.com/LineageOS/hudson/blob/master/lineage-build-targets"
notification or miss firmware updates.<br> >debug builds</a>, not safe and secure release builds.<br>
- LineageOS does not implement - LineageOS requires an unlocked bootloader. Even when installed on devices which support custom
<a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/ Android Verified Boot (AVB) keys, the bootloader cannot be locked due to lack of the OS being
verified-boot#rollback-protection" signed.<br>
>rollback protection</a>, meaning any adversary, from a stranger who physically picks up the device, - LineageOS does not install critically important firmware without manual flashing, requiring users
to a goverment entity remotely, can simply downgrade the OS to a previous version in order to to perform a second update to install this firmware; this likely causes users to ignore the
exploit known notification or miss firmware updates.<br>
<a class="body-link" href="https://en.wikipedia.org/wiki/Vulnerability_(computing)" - LineageOS does not implement
>security vulnerabilities</a>.<br> <a class="body-link" href="https://source.android.com/docs/security/features/verifiedboot/
<br> verified-boot#rollback-protection"
LineageOS is not the only Android OS (commonly, and incorrectly, referred to as a "ROM") with such >rollback protection</a>, meaning any adversary, from a stranger who physically picks up the device,
issues, but it is one of the worst. The only things such insecure OSes can provide you are to a goverment entity remotely, can simply downgrade the OS to a previous version in order to
customisation abilities, and a backdoor to your data. They are best suited as a development OS, not exploit known
a production OS.</p> <a class="body-link" href="https://en.wikipedia.org/wiki/Vulnerability_(computing)"
<br> >security vulnerabilities</a>.<br>
<h4>Solution</h4> <br>
<p>What can you do about this? The answer is simple; however, it does require you to use logic, LineageOS is not the only Android OS (commonly, and incorrectly, referred to as a "ROM") with such
fact, and evidence, not emotion, which is a difficult pill for most people to swallow. Use your issues, but it is one of the worst. The only things such insecure OSes can provide you are
adversaries' weapons against them. The only way to effectively combat the privacy invasion and lack customisation abilities, and a backdoor to your data. They are best suited as a development OS, not
of control of our devices and data is to become a a production OS.</p>
<a class="body-link" href="https://en.wikipedia.org/wiki/Turncoat" <br>
>renegade</a> and not take sides. Yes, that means not taking sides with the closed source, <h4 id="solution"><a href="#solution" class="h4">Solution</a></h4>
proprietary, big tech and government entities, but it also means not taking sides with any <p>What can you do about this? The answer is simple; however, it does require you to use logic,
FOSS entities. The only way to win this war is to take *whatever* hardware and software you can, and fact, and evidence, not emotion, which is a difficult pill for most people to swallow. Use your
use it tactically.</p> adversaries' weapons against them. The only way to effectively combat the privacy invasion and lack
<br> of control of our devices and data is to become a
<p>The only solution for phone security, privacy, and control, is to use a Google Pixel (currently, <a class="body-link" href="https://en.wikipedia.org/wiki/Turncoat"
Pixel 4a-series or newer) running >renegade</a> and not take sides. Yes, that means not taking sides with the closed source,
<a class="body-link" href="https://grapheneos.org/" proprietary, big tech and government entities, but it also means not taking sides with any
>GrapheneOS</a>. Google Pixel phones allow you complete bootloader freedom, including the FOSS entities. The only way to win this war is to take *whatever* hardware and software you can, and
<a class="body-link" href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later" use it tactically.</p>
>ability to lock the bootloader after flashing a custom OS</a> <br>
(GrapheneOS includes a custom OS signing key to allow locking the bootloader and enabling verified <p>The only solution for phone security, privacy, and control, is to use a Google Pixel (currently,
boot to prevent Pixel 4a-series or newer) running
<a class="body-link" href="https://en.wikipedia.org/wiki/Malware" <a class="body-link" href="https://grapheneos.org/"
>malware</a> persistence, evil maid attacks, and boot chain >GrapheneOS</a>. Google Pixel phones allow you complete bootloader freedom, including the
<a class="body-link" href="https://en.wikipedia.org/wiki/Data_corruption" <a class="body-link" href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later"
>corruption</a>), >ability to lock the bootloader after flashing a custom OS</a>
<a class="body-link" href="https://support.google.com/nexus/answer/4457705" (GrapheneOS includes a custom OS signing key to allow locking the bootloader and enabling verified
>long device support lifecycles</a> (minimum 3 years for Pixel 4a-series to Pixel 5a, minimum 5 boot to prevent
years for Pixel 6-series and newer), and <a class="body-link" href="https://en.wikipedia.org/wiki/Malware"
<a class="body-link" href="https://source.android.com/docs/security/bulletin/pixel/" >malware</a> persistence, evil maid attacks, and boot chain
>guaranteed monthly security updates</a> for the entire support timeframe of the devices.</p> <a class="body-link" href="https://en.wikipedia.org/wiki/Data_corruption"
<br> >corruption</a>),
<h4>Conclusion</h4> <a class="body-link" href="https://support.google.com/nexus/answer/4457705"
<p>Use what you can, and do what you can. By neglecting security, you are, even if unintentionally, >long device support lifecycles</a> (minimum 3 years for Pixel 4a-series to Pixel 5a, minimum 5
neglecting exactly what you are trying to gain; privacy and control.</p> years for Pixel 6-series and newer), and
<br> <a class="body-link" href="https://source.android.com/docs/security/bulletin/pixel/"
<br> >guaranteed monthly security updates</a> for the entire support timeframe of the devices.</p>
<br>
<h4 id="conclusion"><a href="#conclusion" class="h4">Conclusion</a></h4>
<p>Use what you can, and do what you can. By neglecting security, you are, even if unintentionally,
neglecting exactly what you are trying to gain; privacy and control.</p>
<br>
<br>
</body> </body>
</html> </html>