oss-sec mailing list archives
Re: Mitigating malicious packages in gnu/linux
From: Jeremy Stanley <fungi () yuggoth org>
Date: Wed, 20 Nov 2019 19:43:39 +0000
On 2019-11-20 13:28:04 -0600 (-0600), Bob Friesenhahn wrote: [...]
Modern GNU/Linux systems have far too much executing code to reasonably secure. Paring down the amount of executing code helps quite a lot with improving security.
In your opinion, how does this compare with proprietary operating systems? Do they have more or less code executed than modern GNU/Linux systems (or can we even know)? How about the popular BSD Unix derivatives? What is your benchmark for the correct amount of code to be executed, or is this analysis based on comparison with an abstract ideal operating system archetype? -- Jeremy Stanley
Attachment:
signature.asc
Description:
Current thread:
- Re: Mitigating malicious packages in gnu/linux, (continued)
- Re: Mitigating malicious packages in gnu/linux Ludovic Courtès (Nov 19)
- Re: Mitigating malicious packages in gnu/linux Morten Linderud (Nov 19)
- Re: Mitigating malicious packages in gnu/linux Pavel Heimlich (Nov 19)
- Re: Mitigating malicious packages in gnu/linux Jakub Wilk (Nov 19)
- Re: Mitigating malicious packages in gnu/linux Solar Designer (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Russ Allbery (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Solar Designer (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Mark Hatle (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Russ Allbery (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Aditya Sirish Arunkumar Yelgundhalli (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Bob Friesenhahn (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Jeremy Stanley (Nov 20)
- Re: Mitigating malicious packages in gnu/linux Bob Friesenhahn (Nov 20)