Yo:
The solution to kernel security is simple: go open source, let people test rigorously, and patch the kernel until it cannot be exploited within reason. All of your encryption isn't going to work when there are bugs in the CPU itself. Additionally, people can disassemble a kernel and know how it does what it does, and what it is doing, but that doesn't mean that they can exploit this knowledge if there is no plausible attack vector.
Closed source models don't add any assurance of security. If anything, open source kernels are more responsive to day 0 threats and have faster, more effective patching than closed source kernels.
--Peace out,
gravaera.
OS security
- gravaera
- Member
- Posts: 737
- Joined: Tue Jun 02, 2009 4:35 pm
- Location: Supporting the cause: Use \tabs to indent code. NOT \x20 spaces.
Re: OS security
17:56 < sortie> Paging is called paging because you need to draw it on pages in your notebook to succeed at it.