[ / / / / / / / / / / / / / ] [ dir / dig ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.1022209>>1022306 [Watch Thread][Show All Posts]

This might be a silly question, but is there any place to download the post-shoah'd grsec kernel patches? I have to imagine there are people who have access to them that post them somewhere.

 No.1022211>>1022226

File (hide): 320052c5d3a2e18⋯.jpg (15.04 KB, 391x327, 391:327, ever end.jpg) (h) (u)

Reminder that intel kikes caused grsec to hide their patches. Some people from the gentoo

project kept the 4.9 grsec kernel alive until eol. From then on, there's been nothing at all. I wish someone

from the fsf or something would sue to get the sources out there, because the contract that grsec customers have

violates the GPL2. I would take a look at this page https://wiki.archlinux.org/index.php/Security#Kernel_hardening

until some development happens. You could also try looking through TOR or i2p for any leaks of the

hardened kernel.


 No.1022226>>1022251

>>1022211

>intel kikes

So Jews jewing Jews. Whatever happened, it did not justify grsec's autistic shitfit and "this software is totally GPL but you can't share the source or we'll deny you future updates" turbojewery.


 No.1022251>>1022255

>>1022226

I like the filename

grsec would've attempted to justify it with something else, I'm sure. As to OP's inquiry and the inquries of

many anons, it's unlikely we'll get something as comprehensive as grsecurity kernel patches released to

the public. A lot of it was funded by e-commerce and financial companies who have to pass through compl-

iance tests every year


 No.1022255>>1022293 >>1022318

>>1022251

Supposedly grsec's code was awful from every perspective except muh security and needed major rewrites for each kernel release, which is why Linus never merged their patches and no one ports their pre-shoah patches to newer kernels.

If these customers so interested in security and insist on a unixlike OS, why don't they just throw shekels at OpenBSD? At least they'd be paying for something secure by design instead of an intentional hackjob designed to part you from your money.


 No.1022293>>1022316 >>1022318

>>1022255

So Alpine and other grsec-dependent distros BTFO?


 No.1022306

>>1022209 (OP)

Unlikely. They're expensive, people who have access are under contract not to distribute them, and if they do, they're risking losing access to grsec. Nobody's going to put their business at risk for muh freedom.


 No.1022316>>1022613

>>1022293

>Alpine

>grsec-dependant

Alpine dropped its grsec patches back in June and it's still more secure than the average Linux distro.


 No.1022318

>>1022255

I'd imagine it would be easier for them to patch their kernels and deal with issues than use a new OS vendor entirely.

If their code was as bad as Linus and co said it was, then I would imagine that might also have to deal with why we don't have

grsec patches anymore. Maybe it was just so unmaintanable for a public release that they just downsized to only dealing with paying

customers.

>>1022293

iirc, their last release that was mostly grsec hardening was back in mid 2017, so when grsec just dropped the ball. Grsec niggers got

mad that they even did that, however.


 No.1022340

They're in that one github repository.


 No.1022613

>>1022316

https://alpinelinux.org/community/code-of-conduct.html

>Diversity and inclusion make the Alpine community strong.

If you can't keep women and niggers away from your software then you can't call it secure.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
10 replies | 2 images | Page ???
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / dig ][ watchlist ]