Update webpage "About" from version 6.2.0 to 6.2.2
This commit is contained in:
parent
41a7718813
commit
f44a1003aa
519
about.html
519
about.html
@ -5,7 +5,7 @@
|
|||||||
<!-- Copyright 2022 Jake Winters -->
|
<!-- Copyright 2022 Jake Winters -->
|
||||||
<!-- SPDX-License-Identifier: BSD-3-Clause -->
|
<!-- SPDX-License-Identifier: BSD-3-Clause -->
|
||||||
|
|
||||||
<!-- Version: 6.2.0 -->
|
<!-- Version: 6.2.2 -->
|
||||||
|
|
||||||
|
|
||||||
<html>
|
<html>
|
||||||
@ -70,25 +70,26 @@
|
|||||||
</section>
|
</section>
|
||||||
<section id="about_me">
|
<section id="about_me">
|
||||||
<h2 id="about_me"><a href="#about_me">About Me</a></h2>
|
<h2 id="about_me"><a href="#about_me">About Me</a></h2>
|
||||||
<p>I am Jake Winters, also known by my pseudonym "Inference", a security researcher
|
<p>I am Jake Winters, also known by my pseudonym "Inference", a security
|
||||||
based in United Kingdom.<br>
|
researcher based in United Kingdom.<br>
|
||||||
I am the founder, lead developer, and administrator, of Inferencium.<br>
|
I am the founder, lead developer, and administrator, of Inferencium.<br>
|
||||||
All opinions are my own, and are not necessarily shared with projects or people I am
|
All opinions are my own, and are not necessarily shared with projects or people
|
||||||
affiliated with.</p>
|
I am affiliated with.</p>
|
||||||
<p>I write about my research and experience in cybersecurity and also physical security.
|
<p>I write about my research and experience in cybersecurity and also physical
|
||||||
Most of my postings are security-related, but I occasionally post about other aspects of
|
security. Most of my postings are security-related, but I occasionally post
|
||||||
my life.</p>
|
about other aspects of my life.</p>
|
||||||
<p>I am an open source advocate for the preservation and modifiability of source code. I
|
<p>I am an open source advocate for the preservation and modifiability of source
|
||||||
believe source code should be considered human knowledge as much as past knowledge and
|
code. I believe source code should be considered human knowledge as much as past
|
||||||
teachings were; it is how modern humanity survives and runs.<br>
|
knowledge and teachings were; it is how modern humanity survives and runs.<br>
|
||||||
Source code being modifiable allows it to be adapted for use by anyone, whether to add
|
Source code being modifiable allows it to be adapted for use by anyone, whether
|
||||||
features, harden it for increased security and/or privacy, or provide accessibility for
|
to add features, harden it for increased security and/or privacy, or provide
|
||||||
disabled users.<br>
|
accessibility for disabled users.<br>
|
||||||
I am also a modular design advocate for the ability to securely and robustly make
|
I am also a modular design advocate for the ability to securely and robustly
|
||||||
changes to hardware and software without the entire system being affected.</p>
|
make changes to hardware and software without the entire system being
|
||||||
<p>I run the public Systems Hardening XMPP channel dedicated to systems security and
|
affected.</p>
|
||||||
privacy hardening at <code>sys-hardening@muc.xmpp.inferencium.net</code>, and its
|
<p>I run the public Systems Hardening XMPP channel dedicated to systems security
|
||||||
respective off-topic channel at
|
and privacy hardening at <code>sys-hardening@muc.xmpp.inferencium.net</code>,
|
||||||
|
and its respective off-topic channel at
|
||||||
<code>sys-hardening-ot@muc.xmpp.inferencium.net</code>.</p>
|
<code>sys-hardening-ot@muc.xmpp.inferencium.net</code>.</p>
|
||||||
<p>If you wish to contact me for any reason, you can use my
|
<p>If you wish to contact me for any reason, you can use my
|
||||||
<a href="https://inferencium.net/contact.html">contact methods</a>.</p>
|
<a href="https://inferencium.net/contact.html">contact methods</a>.</p>
|
||||||
@ -108,15 +109,17 @@
|
|||||||
<section id="licensing">
|
<section id="licensing">
|
||||||
<h2 id="licensing"><a href="#licensing">Licensing</a></h2>
|
<h2 id="licensing"><a href="#licensing">Licensing</a></h2>
|
||||||
<p>I care about upstreaming and sharing code, strongly preferring licenses which
|
<p>I care about upstreaming and sharing code, strongly preferring licenses which
|
||||||
have high license compatibility in order to permit sharing code with as many other projects
|
have high license compatibility in order to permit sharing code with as many
|
||||||
as possible; for this reason, permissive licenses are my preferred choice, while avoiding
|
other projects as possible; for this reason, permissive licenses are my
|
||||||
copyleft licenses and other licenses which place restrictions on how my code may be used,
|
preferred choice, while avoiding copyleft licenses and other licenses which
|
||||||
and prevent me from including important proprietary code, such as firmware, which can patch
|
place restrictions on how my code may be used, and prevent me from including
|
||||||
security vulnerabilities, privacy issues, and stability issues. All of my code is and
|
important proprietary code, such as firmware, which can patch security
|
||||||
will be permissively licensed unless specific circumstances make it impractical or
|
vulnerabilities, privacy issues, and stability issues. All of my code is and
|
||||||
infeasible to do so. My goal is to share code which has the least amount of restrictions as
|
will be permissively licensed unless specific circumstances make it impractical
|
||||||
possible, to allow wider propagation of my code and allow more use cases and possibilities,
|
or infeasible to do so. My goal is to share code which has the least amount of
|
||||||
as well as ensuring proprietary code, whenever required, is permitted to be included.</p>
|
restrictions as possible, to allow wider propagation of my code and allow more
|
||||||
|
use cases and possibilities, as well as ensuring proprietary code, whenever
|
||||||
|
required, is permitted to be included.</p>
|
||||||
<p>My preferred licenses and rationale for using them are below; any licenses
|
<p>My preferred licenses and rationale for using them are below; any licenses
|
||||||
not listed are chosen on a case-by-case basis.</p>
|
not listed are chosen on a case-by-case basis.</p>
|
||||||
<p><a href="https://iso.org/standard/81870.html">ISO 5962:2021</a>
|
<p><a href="https://iso.org/standard/81870.html">ISO 5962:2021</a>
|
||||||
@ -129,50 +132,48 @@
|
|||||||
<code>SPDX-License-Identifier: BSD-3-Clause</code>
|
<code>SPDX-License-Identifier: BSD-3-Clause</code>
|
||||||
<p>Type: Permissive</p>
|
<p>Type: Permissive</p>
|
||||||
<p><a href="https://spdx.org/licenses/BSD-3-Clause.html">BSD 3-Clause License</a>
|
<p><a href="https://spdx.org/licenses/BSD-3-Clause.html">BSD 3-Clause License</a>
|
||||||
is a highly permissive
|
is a highly permissive license which allows content
|
||||||
license which allows content licensed under it to be
|
licensed under it to be used in any way, whether in
|
||||||
used in any way, whether in source or binary form, and
|
source or binary form, and allows sublicensing under a
|
||||||
allows sublicensing under a different license, with the
|
different license, with the only restrictions being the
|
||||||
only restrictions being the original copyright notice
|
original copyright notice must be kept in order to
|
||||||
must be kept in order to attribute the original creator
|
attribute the original creator of the licensed content,
|
||||||
of the licensed content, and the name of the project
|
and the name of the project and/or its contributors may
|
||||||
and/or its contributors may not be used to endorse or
|
not be used to endorse or promote products derived from
|
||||||
promote products derived from the original project.</p>
|
the original project.</p>
|
||||||
<h4 id="licensing-gpl-2.0"><a href="#licensing-gpl-2.0">GNU General Public License v2.0</a></h4>
|
<h4 id="licensing-gpl-2.0"><a href="#licensing-gpl-2.0">GNU General Public License v2.0</a></h4>
|
||||||
<code>SPDX-License-Identifier: GPL-2.0-only</code>
|
<code>SPDX-License-Identifier: GPL-2.0-only</code>
|
||||||
<p>Type: Copyleft</p>
|
<p>Type: Copyleft</p>
|
||||||
<p><a href="https://spdx.org/licenses/GPL-2.0-only.html">GNU General Public License v2.0</a>
|
<p><a href="https://spdx.org/licenses/GPL-2.0-only.html">GNU General Public License v2.0</a>
|
||||||
is a strong
|
is a strong copyleft license which restricts use of
|
||||||
copyleft license which restricts use of content licensed
|
content licensed under it by requiring all source code
|
||||||
under it by requiring all source code of the content to
|
of the content to be publicly available, making
|
||||||
be publicly available, making binary-only form and
|
binary-only form and inclusion of proprietary code
|
||||||
inclusion of proprietary code impossible, requiring all
|
impossible, requiring all derivatives to be licensed
|
||||||
derivatives to be licensed under the same license
|
under the same license (allowing sublicensing under only
|
||||||
(allowing sublicensing under only newer GPL licenses if
|
newer GPL licenses if <code>GPL-2.0-or-later</code> is
|
||||||
<code>GPL-2.0-or-later</code> is specified in the SPDX-
|
specified in the SPDX license identifier), and requiring
|
||||||
License-Identifier), and requiring the original
|
the original copyright notice to be kept in order to
|
||||||
copyright notice to be kept in order to attribute the
|
attribute the original creator of the licensed
|
||||||
original creator of the licensed content.<br>
|
content.<br>
|
||||||
Due to the restrictive and invasive nature of this
|
Due to the restrictive and invasive nature of this
|
||||||
license, it is avoided unless such restrictions would be
|
license, it is avoided unless such restrictions would be
|
||||||
beneficial to my code; whenever this is the
|
beneficial to my code; whenever this is the case, the
|
||||||
case, the GNU General Public License v2.0 will be used,
|
GNU General Public License v2.0 will be used, rather
|
||||||
rather than the more restrictive
|
than the more restrictive
|
||||||
<a href="https://spdx.org/licenses/GPL-3.0-only.html">GNU General Public License v3.0</a>,
|
<a href="https://spdx.org/licenses/GPL-3.0-only.html">GNU General Public License v3.0</a>,
|
||||||
and relicensing
|
and relicensing derivatives under the GNU General Public
|
||||||
derivatives under the GNU General Public License v3.0
|
License v3.0 will be disallowed.</p>
|
||||||
will be disallowed.</p>
|
|
||||||
<h3 id="licensing-noncode"><a href="#licensing-noncode">Non-code</a></h3>
|
<h3 id="licensing-noncode"><a href="#licensing-noncode">Non-code</a></h3>
|
||||||
<h4 id="licensing-cc-by-4.0"><a href="#licensing-cc-by-4.0">Creative Commons Attribution 4.0 International</a></h4>
|
<h4 id="licensing-cc-by-4.0"><a href="#licensing-cc-by-4.0">Creative Commons Attribution 4.0 International</a></h4>
|
||||||
<code>SPDX-License-Identifier: CC-BY-4.0</code>
|
<code>SPDX-License-Identifier: CC-BY-4.0</code>
|
||||||
<p>Type: Permissive</p>
|
<p>Type: Permissive</p>
|
||||||
<p><a href="https://spdx.org/licenses/CC-BY-4.0.html">Creative Commons Attribution 4.0 International</a>
|
<p><a href="https://spdx.org/licenses/CC-BY-4.0.html">Creative Commons Attribution 4.0 International</a>
|
||||||
is a
|
is a highly permissive license which allows content
|
||||||
highly permissive license which allows content licensed
|
licensed under it to be used in any way, in any medium,
|
||||||
under it to be used in any way, in any medium, with the
|
with the only restriction being the original copyright
|
||||||
only restriction being the original copyright notice
|
notice must be kept in order to attribute the original
|
||||||
must be kept in order to attribute the original creator
|
creator of the licensed content.</p>
|
||||||
of the licensed content.</p>
|
|
||||||
<h3 id="licensing-open_source_vs_free_software"><a href="#licensing-open_source_vs_free_software">Do I Distinguish Between Open-source and Free Software?</a></h3>
|
<h3 id="licensing-open_source_vs_free_software"><a href="#licensing-open_source_vs_free_software">Do I Distinguish Between Open-source and Free Software?</a></h3>
|
||||||
<p>No. If code is not released under an open-source license and
|
<p>No. If code is not released under an open-source license and
|
||||||
places restrictions on how the code may be used, it is either
|
places restrictions on how the code may be used, it is either
|
||||||
@ -186,18 +187,18 @@
|
|||||||
<p>This list contains the policies and practices of my services.</p>
|
<p>This list contains the policies and practices of my services.</p>
|
||||||
<p>My policies and practices are heavily security- and privacy-focused, with
|
<p>My policies and practices are heavily security- and privacy-focused, with
|
||||||
improvements made on an ongoing basis as new technologies, protocols, and
|
improvements made on an ongoing basis as new technologies, protocols, and
|
||||||
software etc become available.</p>
|
software become available.</p>
|
||||||
<h3 id="services-websites"><a href="#services-websites">Websites</a></h3>
|
<h3 id="services-websites"><a href="#services-websites">Websites</a></h3>
|
||||||
<ul>
|
<ul>
|
||||||
<li>Unnecessary logging avoided (only logs required for
|
<li>Unnecessary logging avoided (only logs required for security
|
||||||
security and debugging purposes)</li>
|
and debugging purposes)</li>
|
||||||
<li>All server logs purged every 14 days</li>
|
<li>All server logs purged every 14 days</li>
|
||||||
<li>User IP addresses used only for security and debugging
|
<li>User IP addresses used only for security and debugging
|
||||||
purposes (purged along with logs)</li>
|
purposes (purged along with logs)</li>
|
||||||
<li>All connections made via TLS 1.3 (TLS 1.2 and older are
|
<li>All connections made via TLS 1.3 (TLS 1.2 and older are
|
||||||
unsupported) to ensure the most secure AEAD ciphers are used,
|
unsupported) to ensure the most secure AEAD ciphers are used,
|
||||||
along with forward secrecy (each connection uses a
|
along with forward secrecy (each connection uses a different key
|
||||||
different key to previous connections)</li>
|
to previous connections)</li>
|
||||||
<li>All connections made via high-security AEAD ciphers,
|
<li>All connections made via high-security AEAD ciphers,
|
||||||
preferring AES-256-GCM for devices with AES
|
preferring AES-256-GCM for devices with AES
|
||||||
hardware-acceleration, and ChaCha20-Poly1305 for devices without
|
hardware-acceleration, and ChaCha20-Poly1305 for devices without
|
||||||
@ -237,86 +238,119 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Smartphone</td>
|
<td>Smartphone</td>
|
||||||
<td><img src="asset/img/google-pixel_8_pro.png" width="100px" height="100px"/><br>
|
<td>
|
||||||
|
<img src="asset/img/google-pixel_8_pro.png" width="100px" height="100px"/><br>
|
||||||
<br>
|
<br>
|
||||||
Google Pixel</td>
|
Google Pixel
|
||||||
<td class="td-desc"><p>Google Pixel devices are the best Android devices
|
</td>
|
||||||
available on the market for
|
<td class="td-desc">
|
||||||
|
<p>Google Pixel devices are
|
||||||
|
the best Android devices
|
||||||
|
available on the market
|
||||||
|
for
|
||||||
<a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">security and privacy</a>.</p>
|
<a href="https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html">security and privacy</a>.</p>
|
||||||
<p>They allow locking the bootloader with a
|
<p>They allow locking the
|
||||||
|
bootloader with a
|
||||||
<a href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later">custom Android Verified Boot (AVB) key</a>
|
<a href="https://android.googlesource.com/platform/external/avb/+/master/README.md#pixel-2-and-later">custom Android Verified Boot (AVB) key</a>
|
||||||
in order to
|
in order to preserve security
|
||||||
preserve security and privacy features when installing a
|
and privacy features when
|
||||||
custom operating system, such as
|
installing a custom operating
|
||||||
|
system, such as
|
||||||
<a href="https://source.android.com/docs/security/features/verifiedboot/">verified boot</a>
|
<a href="https://source.android.com/docs/security/features/verifiedboot/">verified boot</a>
|
||||||
which verifies that the OS has not
|
which verifies that the OS has
|
||||||
been corrupted or tampered with, and
|
not been corrupted or tampered
|
||||||
|
with, and
|
||||||
<a href="https://source.android.com/docs/security/features/verifiedboot/verified-boot#rollback-protection">rollback protection</a>
|
<a href="https://source.android.com/docs/security/features/verifiedboot/verified-boot#rollback-protection">rollback protection</a>
|
||||||
which prevents an adversary
|
which prevents an adversary from
|
||||||
from rolling back the OS or firmware version to a
|
rolling back the OS or firmware
|
||||||
previous version with known security vulnerabilities.</p>
|
version to a previous version
|
||||||
|
with known security vulnerabilities.</p>
|
||||||
<p>They also include a
|
<p>They also include a
|
||||||
<a href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
|
<a href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
|
||||||
(Titan M2, improving on
|
(Titan M2, improving on the
|
||||||
the previous generation
|
previous generation
|
||||||
<a href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
|
<a href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
|
||||||
which is extremely resistant to both
|
which is extremely resistant to
|
||||||
remote and physical attacks due to being completely
|
both remote and physical attacks
|
||||||
isolated from the rest of the system, including the
|
due to being completely isolated
|
||||||
operating system. Titan M2 ensures that the device
|
from the rest of the system,
|
||||||
cannot be remotely compromised by requiring the side
|
including the operating system.
|
||||||
buttons of the device to be physically pressed for some
|
Titan M2 ensures that the device
|
||||||
sensitive operations. Titan M2 also takes the role of
|
cannot be remotely compromised
|
||||||
|
by requiring the side buttons of
|
||||||
|
the device to be physically
|
||||||
|
pressed for some sensitive
|
||||||
|
operations. Titan M2 also takes
|
||||||
|
the role of
|
||||||
<a href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
|
<a href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
|
||||||
a
|
a
|
||||||
<a href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
|
<a href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
|
||||||
containing sensitive user
|
containing sensitive user keys
|
||||||
keys which are unavailable to the OS or apps running on
|
which are unavailable to the OS
|
||||||
it without authorisation from Titan M2 itself.
|
or apps running on it without
|
||||||
|
authorisation from Titan M2 itself.
|
||||||
<a href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack resistance</a>
|
<a href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack resistance</a>
|
||||||
ensures that Titan M2
|
ensures that Titan M2 firmware
|
||||||
firmware can be flashed only if the user PIN/password is
|
can be flashed only if the user
|
||||||
already known, making it impossible to backdoor the
|
PIN/password is already known,
|
||||||
device without already knowing these secrets.</p>
|
making it impossible to backdoor
|
||||||
<p>Google Pixel device kernels are compiled with
|
the device without already
|
||||||
|
knowing these secrets.</p>
|
||||||
|
<p>Google Pixel device kernels
|
||||||
|
are compiled with
|
||||||
<a href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html">forward-edge control-flow integrity</a>
|
<a href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html">forward-edge control-flow integrity</a>
|
||||||
and
|
and
|
||||||
<a href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html">backward-edge control-flow integrity</a>
|
<a href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html">backward-edge control-flow integrity</a>
|
||||||
to prevent
|
to prevent code reuse attacks
|
||||||
code reuse attacks against the kernel. MAC address
|
against the kernel. MAC address
|
||||||
randomisation is
|
randomisation is
|
||||||
<a href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.</p>
|
<a href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html">implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.</p>
|
||||||
<p>Google releases
|
<p>Google releases
|
||||||
<a href="https://source.android.com/docs/security/bulletin/pixel/">guaranteed monthly security updates</a>,
|
<a href="https://source.android.com/docs/security/bulletin/pixel/">guaranteed monthly security updates</a>,
|
||||||
ensuring
|
ensuring Google Pixel devices
|
||||||
Google Pixel devices are up-to-date and quickly
|
are up-to-date and quickly
|
||||||
protected against security vulnerabilities.</p>
|
protected against security
|
||||||
<p>Pixel 6-series and 7-series devices are a large
|
vulnerabilities.</p>
|
||||||
improvement over the already very secure and private
|
<p>Pixel 6-series and 7-series
|
||||||
previous generation Pixel devices. They replace
|
devices are a large improvement
|
||||||
ARM-based Titan M with RISC-V-based Titan M2, reducing
|
over the already very secure and
|
||||||
trust by removing ARM from the equation. Titan M2 is
|
private previous generation
|
||||||
more resiliant to attacks than Titan M, and is
|
Pixel devices. They replace
|
||||||
|
ARM-based Titan M with
|
||||||
|
RISC-V-based Titan M2, reducing
|
||||||
|
trust by removing ARM from the
|
||||||
|
equation. Titan M2 is more
|
||||||
|
resiliant to attacks than Titan
|
||||||
|
M, and is
|
||||||
<a href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf">AVA_VAN.5 certified</a>,
|
<a href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf">AVA_VAN.5 certified</a>,
|
||||||
the highest level of
|
the highest level of
|
||||||
vulnerability assessment. Google's in-house Tensor SoC
|
vulnerability assessment.
|
||||||
includes Tensor Security Core, further improving device
|
Google's in-house Tensor
|
||||||
security.<br>
|
System-on-Chip includes Tensor
|
||||||
Pixel 8-series includes Arm v9's
|
Security Core, further improving
|
||||||
|
device security.<br>
|
||||||
|
Pixel 8-series includes Armv9's
|
||||||
<a href="https://community.arm.com/arm-community-blogs/b/architectures-and-processors-blog/posts/enhanced-security-through-mte">Memory Tagging Extension</a>,
|
<a href="https://community.arm.com/arm-community-blogs/b/architectures-and-processors-blog/posts/enhanced-security-through-mte">Memory Tagging Extension</a>,
|
||||||
which dramatically increases device security by
|
which dramatically increases
|
||||||
eliminating up to 95% of all security issues
|
device security by eliminating
|
||||||
|
up to 95% of all security issues
|
||||||
caused by memory-unsafety.</p>
|
caused by memory-unsafety.</p>
|
||||||
<p>Pixel 6-series and 7-series devices are supported for a
|
<p>Pixel 6-series and 7-series
|
||||||
|
devices are supported for a
|
||||||
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-a-pixel-pixel-pro-pixel-a-pixel-pixel-pro-pixel-fold">minimum of 5 years from launch</a>,
|
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-a-pixel-pixel-pro-pixel-a-pixel-pixel-pro-pixel-fold">minimum of 5 years from launch</a>,
|
||||||
an increase from previous generations'
|
an increase from previous
|
||||||
|
generations'
|
||||||
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-a-g-pixel-pixel-a-g-pixel-a-pixel-xl-pixel">minimum support lifecycles of 3 years</a>.<br>
|
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-a-g-pixel-pixel-a-g-pixel-a-pixel-xl-pixel">minimum support lifecycles of 3 years</a>.<br>
|
||||||
Pixel 8-series is supported for a
|
Pixel 8-series is supported for
|
||||||
|
a
|
||||||
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-pro">minimum of 7 years from launch</a>,
|
<a href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-pro">minimum of 7 years from launch</a>,
|
||||||
putting it on the same support level as Apple;
|
putting it on the same support
|
||||||
Google have even surpassed Apple in this regard,
|
level as Apple; Google have even
|
||||||
as Apple does not commit to a support timeframe
|
surpassed Apple in this regard,
|
||||||
for their devices.</p></td>
|
as Apple does not commit to a
|
||||||
|
support timeframe for their
|
||||||
|
devices.</p>
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
</div>
|
</div>
|
||||||
@ -334,55 +368,78 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Operating system</td>
|
<td>Operating system</td>
|
||||||
<td><img src="asset/img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
|
<td>
|
||||||
|
<img src="asset/img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
|
||||||
<br>
|
<br>
|
||||||
Gentoo Linux</td>
|
Gentoo Linux
|
||||||
<td class="td-desc"><p><a href="https://www.gentoo.org/">Gentoo Linux</a>
|
</td>
|
||||||
is a highly modular, source-based,
|
<td class="td-desc">
|
||||||
Linux-based operating system which allows vast
|
<p><a href="https://www.gentoo.org/">Gentoo Linux</a>
|
||||||
customisation to tailor the operating system to suit
|
is a highly modular,
|
||||||
your specific needs. There are many advantages to such
|
source-based, Linux-based
|
||||||
an operating system, with the most notable being the
|
operating system which allows
|
||||||
ability to optimise the software for security, privacy,
|
vast customisation to tailor the
|
||||||
performance, or power usage; however, there are
|
operating system to suit your
|
||||||
effectively unlimited other use cases, or a combination
|
specific needs. There are many
|
||||||
of multiple use cases.</p>
|
advantages to such an operating
|
||||||
<p>I have focused on security hardening and privacy
|
system, with the most notable
|
||||||
hardening, placing performance below those aspects,
|
being the ability to optimise
|
||||||
although my system is still very performant. Some of the
|
the software for security,
|
||||||
hardening I apply includes
|
privacy, performance, or power
|
||||||
|
usage; however, there are
|
||||||
|
effectively unlimited other use
|
||||||
|
cases, or a combination of
|
||||||
|
multiple use cases.</p>
|
||||||
|
<p>I have focused on security
|
||||||
|
hardening and privacy hardening,
|
||||||
|
placing performance below those
|
||||||
|
aspects, although my system is
|
||||||
|
still very performant. Some of
|
||||||
|
the hardening I apply includes
|
||||||
<a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection">stack protection</a>,
|
<a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection">stack protection</a>,
|
||||||
<a href="https://en.wikipedia.org/wiki/Integer_overflow">signed integer overflow wrapping</a>,
|
<a href="https://en.wikipedia.org/wiki/Integer_overflow">signed integer overflow trapping</a>,
|
||||||
and GrapheneOS'
|
and GrapheneOS'
|
||||||
<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>
|
<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>
|
||||||
memory allocator.</p>
|
memory allocator.</p>
|
||||||
You can find my Gentoo Linux configurations in
|
You can find my Gentoo Linux
|
||||||
my
|
configurations in my
|
||||||
<a href="https://src.inferencium.net/Inferencium/cfg/">configuration respository</a>.</p></td>
|
<a href="https://src.inferencium.net/Inferencium/cfg/">configuration respository</a>.</p>
|
||||||
<td>Open source<br>
|
</td>
|
||||||
|
<td>
|
||||||
|
Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(GPL-2.0-only)</td>
|
(GPL-2.0-only)
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Web browser</td>
|
<td>Web browser</td>
|
||||||
<td><img src="asset/img/logo-chromium.png" width="100px" height="100px"/><br>
|
<td>
|
||||||
|
<img src="asset/img/logo-chromium.png" width="100px" height="100px"/><br>
|
||||||
<br>
|
<br>
|
||||||
Chromium</td>
|
Chromium
|
||||||
<td class="td-desc"><p><a href="https://chromium.org/">Chromium</a>
|
</td>
|
||||||
is a highly secure web browser which is
|
<td class="td-desc">
|
||||||
often ahead of other web browsers in security aspects.
|
<p><a href="https://chromium.org/">Chromium</a>
|
||||||
It has a dedicated security team and a very impressive
|
is a highly secure web browser
|
||||||
|
which is often ahead of other
|
||||||
|
web browsers in security
|
||||||
|
aspects. It has a dedicated
|
||||||
|
security team and a very
|
||||||
|
impressive
|
||||||
<a href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
|
<a href="https://www.chromium.org/Home/chromium-security/brag-sheet/">security brag sheet</a>.
|
||||||
Chromium's security features include a strong
|
Chromium's security features
|
||||||
|
include a strong
|
||||||
<a href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
|
<a href="https://code.google.com/p/chromium/wiki/LinuxSandboxing">multi-layer sandbox</a>,
|
||||||
strong
|
strong
|
||||||
<a href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
|
<a href="https://www.chromium.org/Home/chromium-security/site-isolation">site isolation</a>,
|
||||||
<a href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
|
<a href="https://www.chromium.org/Home/chromium-security/binding-integrity">Binding Integrity</a>
|
||||||
memory hardening, and
|
memory hardening, and
|
||||||
<a href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.</p></td>
|
<a href="https://www.chromium.org/developers/testing/control-flow-integrity/">control-flow integrity (CFI)</a>.</p></td>
|
||||||
<td>Open source<br>
|
<td>
|
||||||
|
Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(BSD-3-Clause)</td>
|
(BSD-3-Clause)
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
</div>
|
</div>
|
||||||
@ -399,19 +456,29 @@
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Operating system</td>
|
<td>Operating system</td>
|
||||||
<td><img src="asset/img/logo-grapheneos.png" width="100px" height="100px"/><br>
|
<td>
|
||||||
|
<img src="asset/img/logo-grapheneos.png" width="100px" height="100px"/><br>
|
||||||
<br>
|
<br>
|
||||||
GrapheneOS</td>
|
GrapheneOS
|
||||||
<td class="td-desc"><p><a href="https://grapheneos.org/">GrapheneOS</a>
|
</td>
|
||||||
|
<td class="td-desc">
|
||||||
|
<p><a href="https://grapheneos.org/">GrapheneOS</a>
|
||||||
is a security-hardened,
|
is a security-hardened,
|
||||||
privacy-hardened, secure-by-default, Android-based
|
privacy-hardened,
|
||||||
operating system which implements extensive, systemic
|
secure-by-default, Android-based
|
||||||
security and privacy hardening to the Android Open
|
operating system which
|
||||||
Source Project used as its base codebase. Its hardening
|
implements extensive, systemic
|
||||||
includes closing gaps for apps to access sensitive
|
security and privacy hardening
|
||||||
system information, a secure app spawning feature which
|
to the Android Open Source
|
||||||
avoids sharing address space layout and other secrets
|
Project used as its base
|
||||||
AOSP's default Zygote app spawning model would share,
|
codebase. Its hardening includes
|
||||||
|
closing gaps for apps to access
|
||||||
|
sensitive system information, a
|
||||||
|
secure app spawning feature
|
||||||
|
which avoids sharing address
|
||||||
|
space layout and other secrets
|
||||||
|
AOSP's default Zygote app
|
||||||
|
spawning model would share,
|
||||||
<a href="https://github.com/GrapheneOS/kernel_gs-gs101/">hardened kernel</a>,
|
<a href="https://github.com/GrapheneOS/kernel_gs-gs101/">hardened kernel</a>,
|
||||||
hardened memory allocator
|
hardened memory allocator
|
||||||
(<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>)
|
(<a href="https://github.com/GrapheneOS/hardened_malloc/">hardened_malloc</a>)
|
||||||
@ -422,90 +489,130 @@
|
|||||||
and local and remote
|
and local and remote
|
||||||
hardware-backed attestation
|
hardware-backed attestation
|
||||||
(<a href="https://attestation.app/about/">Auditor</a>)
|
(<a href="https://attestation.app/about/">Auditor</a>)
|
||||||
to ensure the OS has not been corrupted or
|
to ensure the OS has not been
|
||||||
tampered with.</p>
|
corrupted or tampered with.</p>
|
||||||
<p>GrapheneOS only supports
|
<p>GrapheneOS only supports
|
||||||
<a href="https://grapheneos.org/faq#device-support">high security and well-supported devices</a>
|
<a href="https://grapheneos.org/faq#device-support">high security and well-supported devices</a>
|
||||||
which
|
which receive full support from
|
||||||
receive full support from their manufacturers, including
|
their manufacturers, including
|
||||||
firmware updates, long support lifecycles, secure
|
firmware updates, long support
|
||||||
hardware, and overall high security practices.</p>
|
lifecycles, secure hardware, and
|
||||||
<p>For an extensive list of features GrapheneOS provides,
|
overall high security
|
||||||
|
practices.</p>
|
||||||
|
<p>For an extensive list of
|
||||||
|
features GrapheneOS provides,
|
||||||
visit its
|
visit its
|
||||||
<a href="https://grapheneos.org/features/">official features list</a>
|
<a href="https://grapheneos.org/features/">official features list</a>
|
||||||
which provides extensive documentation.</p></td>
|
which provides extensive
|
||||||
<td>Open source<br>
|
documentation.</p>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(MIT)</td>
|
(MIT)
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Web browser</td>
|
<td>Web browser</td>
|
||||||
<td><img src="asset/img/logo-vanadium.png" width="100px" height="100px"/><br>
|
<td>
|
||||||
|
<img src="asset/img/logo-vanadium.png" width="100px" height="100px"/><br>
|
||||||
<br>
|
<br>
|
||||||
Vanadium</td>
|
Vanadium
|
||||||
<td class="td-desc"><p>Vanadium is a security-hardened, privacy-hardened
|
</td>
|
||||||
Chromium-based web browser which utilises GrapheneOS'
|
<td class="td-desc">
|
||||||
operating system hardening to implement stronger
|
<p>Vanadium is a
|
||||||
defenses to the already very secure Chromium web
|
security-hardened,
|
||||||
browser. Its hardening alongside Chromium's base
|
privacy-hardened Chromium-based
|
||||||
security features includes
|
web browser which utilises
|
||||||
|
GrapheneOS' operating system
|
||||||
|
hardening to implement stronger
|
||||||
|
defenses to the already very
|
||||||
|
secure Chromium web browser. Its
|
||||||
|
hardening alongside Chromium's
|
||||||
|
base security features includes
|
||||||
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0081-Implement-UI-for-JIT-site-settings.patch">disabling JavaScript just-in-time (JIT) compilation by default</a>,
|
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0081-Implement-UI-for-JIT-site-settings.patch">disabling JavaScript just-in-time (JIT) compilation by default</a>,
|
||||||
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0051-stub-out-the-battery-status-API.patch">stubbing out the battery status API to prevent abuse of it</a>,
|
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0051-stub-out-the-battery-status-API.patch">stubbing out the battery status API to prevent abuse of it</a>,
|
||||||
and
|
and
|
||||||
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0084-Toggle-for-navigating-external-URL-in-incognito.patch">always-on Incognito mode as an option</a>.</p>
|
<a href="https://github.com/GrapheneOS/Vanadium/blob/13/patches/0084-Toggle-for-navigating-external-URL-in-incognito.patch">always-on Incognito mode as an option</a>.</p>
|
||||||
<p>Vanadium's source code, including its Chromium patchset,
|
<p>Vanadium's source code,
|
||||||
|
including its Chromium patchset,
|
||||||
can be found in its
|
can be found in its
|
||||||
<a href="https://github.com/GrapheneOS/Vanadium/">official repository</a>.</p></td>
|
<a href="https://github.com/GrapheneOS/Vanadium/">official repository</a>.</p></td>
|
||||||
<td>Open source<br>
|
<td>
|
||||||
|
Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(GPL-2.0-only)</td>
|
(GPL-2.0-only)
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Messenger</td>
|
<td>Messenger</td>
|
||||||
<td><img src="asset/img/logo-molly.png" width="100px" height="100px"><br>
|
<td>
|
||||||
|
<img src="asset/img/logo-molly.png" width="100px" height="100px"><br>
|
||||||
<br>
|
<br>
|
||||||
Molly</td>
|
Molly
|
||||||
<td class="td-desc"><p><a href="https://molly.im/">Molly</a>
|
</td>
|
||||||
is a security-hardened, privacy-hardened
|
<td class="td-desc">
|
||||||
|
<p><a href="https://molly.im/">Molly</a>
|
||||||
|
is a security-hardened,
|
||||||
|
privacy-hardened
|
||||||
<a href="https://signal.org/">Signal</a>
|
<a href="https://signal.org/">Signal</a>
|
||||||
client which hardens Signal by using a
|
client which hardens Signal by
|
||||||
variety of
|
using a variety of
|
||||||
<a href="https://github.com/mollyim/mollyim-android#features">unique features</a>,
|
<a href="https://github.com/mollyim/mollyim-android#features">unique features</a>,
|
||||||
allowing
|
allowing
|
||||||
<a href="https://github.com/mollyim/mollyim-android/wiki/Data-Encryption-At-Rest">locking the database when not in use</a>,
|
<a href="https://github.com/mollyim/mollyim-android/wiki/Data-Encryption-At-Rest">locking the database when not in use</a>,
|
||||||
and
|
and
|
||||||
<a href="https://github.com/mollyim/mollyim-android/blob/a81ff7d120adc9d427be17239107343146bad704/app/src/main/java/org/thoughtcrime/securesms/crypto/MasterSecretUtil.java#L91">utilising Android StrongBox</a>
|
<a href="https://github.com/mollyim/mollyim-android/blob/a81ff7d120adc9d427be17239107343146bad704/app/src/main/java/org/thoughtcrime/securesms/crypto/MasterSecretUtil.java#L91">utilising Android StrongBox</a>
|
||||||
to protect user keys
|
to protect user keys
|
||||||
using the device's hardware security module.</p>
|
using the device's hardware
|
||||||
|
security module.</p>
|
||||||
<p>Molly is available in
|
<p>Molly is available in
|
||||||
<a href="https://github.com/mollyim/mollyim-android#free-and-open-source">2 flavours</a>:
|
<a href="https://github.com/mollyim/mollyim-android#free-and-open-source">2 flavours</a>:
|
||||||
<ul>
|
<ul>
|
||||||
<li>Molly, which includes the same
|
<li>Molly, which
|
||||||
proprietary Google code as Signal to
|
includes the
|
||||||
support more features.</li>
|
same proprietary
|
||||||
<br>
|
Google code as
|
||||||
<li>Molly-FOSS, which removes the
|
Signal to
|
||||||
proprietary Google code to provide an
|
support more
|
||||||
entirely open-source client.</li>
|
features.</li>
|
||||||
|
<li>Molly-FOSS,
|
||||||
|
which removes
|
||||||
|
the proprietary
|
||||||
|
Google code to
|
||||||
|
provide an
|
||||||
|
entirely
|
||||||
|
open-source
|
||||||
|
client.</li>
|
||||||
</ul>
|
</ul>
|
||||||
</p></td>
|
</p>
|
||||||
<td>Open source<br>
|
</td>
|
||||||
|
<td>
|
||||||
|
Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(GPL-3.0-only)</td>
|
(GPL-3.0-only)
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Messenger</td>
|
<td>Messenger</td>
|
||||||
<td><img src="asset/img/logo-conversations.png" width="100px" height="100px"><br>
|
<td>
|
||||||
|
<img src="asset/img/logo-conversations.png" width="100px" height="100px"><br>
|
||||||
<br>
|
<br>
|
||||||
Conversations</td>
|
Conversations
|
||||||
<td class="td-desc"><p><a href="https://conversations.im/">Conversations</a>
|
</td>
|
||||||
|
<td class="td-desc">
|
||||||
|
<p><a href="https://conversations.im/">Conversations</a>
|
||||||
is a well-designed Android
|
is a well-designed Android
|
||||||
<a href="https://xmpp.org/">XMPP</a>
|
<a href="https://xmpp.org/">XMPP</a>
|
||||||
client which serves as the de facto XMPP
|
client which serves as the de
|
||||||
reference client and has great usability.</p></td>
|
facto XMPP reference client and
|
||||||
<td>Open source<br>
|
has great usability.</p>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Open source<br>
|
||||||
<br>
|
<br>
|
||||||
(GPL-3.0-only)</td>
|
(GPL-3.0-only)
|
||||||
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
</div>
|
</div>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user