From d2e2640507f82c70e6b4c1d3bae28c50c22bfac7 Mon Sep 17 00:00:00 2001 From: Tommy Date: Mon, 30 Jan 2023 08:01:31 -0500 Subject: [PATCH] Remove redundant disclaimer Signed-off-by: Tommy --- content/posts/linux/Desktop-Linux-Hardening.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/content/posts/linux/Desktop-Linux-Hardening.md b/content/posts/linux/Desktop-Linux-Hardening.md index 7d3b9aa..c6399d1 100644 --- a/content/posts/linux/Desktop-Linux-Hardening.md +++ b/content/posts/linux/Desktop-Linux-Hardening.md @@ -9,8 +9,6 @@ Linux is [not a secure desktop operating system](/posts/linux/linux-insecurities **Before we start...** -This guide is largely based on [Madaidan's Linux Hardening Guide](https://madaidans-insecurities.github.io/guides/linux-hardening.html), however this guide strives to consider the usability and ease of maintenance of each recommendation. The goal is to produce a guide that intermediate to advanced Linux users can reasonably follow to set up and maintain the security configurations. It does **not** endeavor to be distribution agnostic; distribution‑specific recommendations are to be expected. - Some of the sections will include mentions of unofficial builds of packages like linux‑hardened, lkrg‑akmod, hardened_malloc, and so on. These are not endorsements --- they are merely to show that you have options to easily obtain and update these packages. Using unofficial builds of packages means adding more parties to trust, and you have to evaluate whether it is worth doing so for the potential privacy/security benefits or not. ![Fedora Tux](/images/fedora-tux.png)