she/they/vi
Mastodon: https://mastodon.online/web/@rockymcdonald
Avatar and banner by Ivanoff~commonswiki on Wikimedia Commons.
If I remember correctly, Windows and macOS have had verified boot for a while now, and all of Apple’s OS’s permissions models are some of the best.
Have you heard of Nix?
Interesting! Are there security properties of OSs that use a sort-of macrokernel?
Sure. Linux’s lack of application sandboxing, verified boot, and permissions model makes it so, and I’m happy to answer any questions.
Amazing work! How do you feel about Nix flakes deployment?
We do not need to “bridge divides” to defeat the 1%. We need to defeat the 1% by any means necessary.
Formal verification is a thorough process.
Zircon is the kernel for Fuchsia.
As a copyright abolitionist, I wholeheartedly agree with you and support the freedom of GNU/Linux entirely, and that is why I hold it to such high standards of security. GNU/Linux is private, sure, but not secure by default. Please read Madaidan’s article on Linux’s security model and his guide to Linux hardening. I’m personally holding out for such promising alternatives such as (a potentially ungoogled) Fuchsia. Did you know that the FLOSS kernel SeL4 is proven to be correct with mathematical precision? POSIX compliant innovations will someday leave Linux in the dust.
I created a community around this article and it’s repurcussions.
Yeah, in my part in the Southwest of so-called America, we call irt a messenger bag.
Remember that Chrome and Chromium OS are a thing.
I don’t think Linux by design has a security model conducive to desktop computing.
See https://flatkill.org/2020 and https://madaidans-insecurities.github.io/linux.html#flatpak, please. Linux still lacks a proper security model.