{{Header}} {{title|title= Security Research by {{project_name_short}} }} {{#seo: |description=Security research, audits, and vulnerability reports published by {{project_name_short}}. }} {{about_mininav}} {{intro| This page tracks security research and vulnerability reports contributed by {{project_name_short}}, including links to upstream bug reports and internal research notes. }} = Security Vulnerability Bug Reports = Security issue reports filed at other projects. See: * [https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108288 Local privilege escalation via zuluPolkit, caused by Debian patch] = Security Research = {{IntroLike| Practical defensive security research: hardening work, threat modeling, and attack surface analysis. Synthesis of Linux distribution maintainer oriented decision making, security engineering, and [[Dev/maintainability|maintainability]] considerations. }} {| class="wikitable" |+ Design pages: Security research triage (in progress) |- ! Page ! Short summary ! Type |- | [[Dev/Strong_Linux_User_Account_Isolation|Strong Linux User Account Isolation]] | Overview of Linux user and root separation, attack vectors, and default and optional hardening measures. | Research |- | [[Verified_Boot|Verified Boot]] | Explains verified boot and chain of trust goals, advantages, limitations, and implementation considerations. | Research |- | [[ram-wipe]] / [[Dev/RAM_Wipe|Dev/RAM Wipe]] | Research and implementation of a dracut module that wipes RAM on shutdown. | Research |- | [[Dev/Entropy|Entropy]] | Technical discussion of entropy sources and randomness topics. | Research |- | [[Dev/remount-secure|remount-secure]] | Hardening proposal for secure mount options and a maintainable way for a distribution to apply them. | Research |- | [[Dev/compiler_hardening|Compiler Hardening]] | Overview of compiler hardening flags and link time options for GCC and Clang, focusing on exploit mitigation and diagnostics. | Notepad |- | [[Dev/About_Computer_(In)Security|About Computer (In)Security]] | Broad background notes and examples about computer insecurity and related concepts. | Essay |- | [[Trust|Trusting Kicksecure]] | Trust model discussion (backdoors, signatures, image verification) and how to place trust in the supply chain. | Essay |- | [[Dev/Secure_Boot|Secure Boot]] | Critical discussion of Secure Boot design tradeoffs, threat model, and limitations for user controlled trust currently on Intel/AMD64. | Summary |- | [[Dev/Stateless|Factory Reset, Stateless Systems, Anti-Hysteresis]] | Discussion of stateless and anti-hysteresis systems, upgrades and rollback risks, and links to related immutable approaches. | Notepad |- | [[Dev/apt-revoker|apt-revoker]] | Proposal for tooling to revoke compromised APT signing keys. | Design |- | [[Dev/Stable_vs_Rolling_Distributions|Stable vs Rolling Distributions - Security Analysis]] | Security analysis of stable and rolling release models. | Analysis |- | [[Dev/Permanent_Takedown_Attack_Defender|Permanent Takedown Attack Defender]] | Proposal to keep project metadata and update communication resilient against takedown, rollback, and freeze attacks, with Tor and signature considerations. | Design |- | [[Dev/confidential_computing|Confidential Computing]] | Survey and threat model notes around encrypted RAM and remote attestation technologies for cloud and hardware trust. | Survey |- | [[Vm-app-manager|vm-app-manager]] | Proposal for a virtualization based application sandbox with reduced VM escape surface and user controllable isolation features. | Notepad |- |} Pages marked "Notepad" are security relevant working notes or drafts that likely need more structure or completion before being presented as finished security research. Pages marked "Essay" are mostly conceptual discussion. = Privacy and Anonymity Research = See {{whonix_wiki |wikipage=Dev/research |text=Whonix research }}. {{Footer}} [[Category:Development]]