[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: Amutable.png (271 KB, 1080x550)
271 KB
271 KB PNG
General computing is insecure.
>>
Go on. Tell me about your AI powered blockchain zero trust silver bullet that will solve security once and for all.
>>
>>107991471
It's just more secure okay.
Are you against progress?
>>
>>107991406
Yes. Life itself is insecure. Security is the polar opposite of freedom and I am willing to accept insecurity to keep my freedom.
I am not interested in what you have to offer. Especially not if it comes with immutable-whatever BS.
>>
no one cares about your shitty gaming ram retard
>>
File: file.png (113 KB, 1434x988)
113 KB
113 KB PNG
>>107991406
>look at the company
>lennart poettering made a company with a bunch of his friends that focuses on providing boot, runtime, and build integrity in linux
What's the issue?
>>
File: file.png (131 KB, 1434x802)
131 KB
131 KB PNG
>>107991958
looking through the fosdem talk descriptions

>Path Safety in the Trenches(Aleksa Sarai)
Over the past decade (or three) of container runtimes on Linux, the attacks against container runtimes with the most bang-for-your-buck have generally been filesystem related — often in the form of a confused-deputy style attack. This is aided in part by the sheer number of juicy targets accessible through filesystem APIs such as /proc.

too long to post the rest

>VM Integration in systemd(Lennart Poettering)
systemd supports a number of integration features that allow VMMs certain access to the inner state of VM guests for provisioning, synchronization and interaction, and many of them are little known, even though very very useful. In this talk I'd like to shed some light on many such integration points, such as SMBIOS type 11 based system credential provisioning; state propagation/readiness notification via AF_VSOCK; SSH support via AF_VSOCK, and so on.

>VFS News(Christian Brauner)
In this session we're going to take a look at new developments in the VFS layer and related areas.

>Native OCI Container Support in systemd(Lennart Poettering)
OCI is many things, and soon it's a format systemd is going to understand somewhat natively. In this talk I want to explain the how, the why, and where we are going with this.

There's also other stuff but you get my point.
>>
>>107991991
>>107991958
>see website design
Can flat design like this just die already? It looks like utter dogshit.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.