mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-11-18 04:21:34 -05:00
33 lines
2.1 KiB
XML
33 lines
2.1 KiB
XML
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
|
|
<channel>
|
|
<title>Operating Systems on PrivSec.dev</title>
|
|
<link>https://privsec.dev/os/</link>
|
|
<description>Recent content in Operating Systems on PrivSec.dev</description>
|
|
<generator>Hugo -- gohugo.io</generator>
|
|
<lastBuildDate>Wed, 30 Mar 2022 21:23:12 +0000</lastBuildDate><atom:link href="https://privsec.dev/os/index.xml" rel="self" type="application/rss+xml" />
|
|
<item>
|
|
<title>Docker and OCI Hardening</title>
|
|
<link>https://privsec.dev/os/docker-and-oci-hardening/</link>
|
|
<pubDate>Wed, 30 Mar 2022 21:23:12 +0000</pubDate>
|
|
|
|
<guid>https://privsec.dev/os/docker-and-oci-hardening/</guid>
|
|
<description>Containers aren&rsquo;t that new fancy thing anymore, but they were a big deal. And they still are. They are a concrete solution to the following problem:
|
|
- Hey, your software doesn&rsquo;t work&hellip;
|
|
- Sorry, it works on my computer! Can&rsquo;t help you.
|
|
Whether we like them or not, containers are here to stay. Their expressiveness and semantics allow for an abstraction of the OS dependencies that a software has, the latter being often dynamically linked against certain libraries.</description>
|
|
</item>
|
|
|
|
<item>
|
|
<title>Linux Insecurities</title>
|
|
<link>https://privsec.dev/os/linux-insecurities/</link>
|
|
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
|
|
|
|
<guid>https://privsec.dev/os/linux-insecurities/</guid>
|
|
<description>There is a common misconception among privacy communities that Linux is one of the more secure operating systems, either because it is open source or because it is widely used in the cloud. This is however, a far cry from reality.
|
|
There is already a very indepth technical blog explaning the various security weaknesses of Linux by Madaidan, Whonix&rsquo;s Security Researcher. This page will attempt to address some of the questions commonly raised in reaction to his blog post.</description>
|
|
</item>
|
|
|
|
</channel>
|
|
</rss>
|