this post was submitted on 30 Jan 2026
55 points (96.6% liked)
Linux
61815 readers
491 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 6 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Amutable's approach is a bit vague, but their homepage states: 'We are building cryptographically verifiable integrity into Linux systems. Every system starts in a verified state and stays trusted over time.' I read that as starting in a trusted state, presumably via a secureboot verified bootchain, then ensuring that the software running on the OS is in a 'trusted' state at all times. In particular, they also say "Build integrity, Boot integrity, Runtime integrity, That's Amutable" as a tag line, which reinforces the runtime nature of the validation.
I could have been clearer there, I'm referring to OS vendor or distro maintainer. Someone has to be in control of what is "trusted", and it's either the administrator of the machine, or the OS vendor. If it's the administrator of the machine, a malicious actor has an attack route to update the list to include their own malware, and if it's not the administrator you end up in a Android type situation, where the OS vendor decides.
Secure Boot secures the boot chain, but after that has no part in maintaining the integrity of the system. I agree that it would not make sense to make this some sort of DRM like system, but that does not mean that they will not try. Pottering seems to have the ears of people who are influential enough that even his bad ideas get far more traction than they should.
Not really, they might make some things naturally harder to do, but they all run the same kernel and can load ELF binaries. Even the most locked down, immutable, system can be made to do things the distro maintainers didn't expect.
Indeed, verifying the boot chain does not, necessarily, limit what the admin if the machine can do. My concern is that Amutable seem to be seeking to go a lot further than that, and verify what is being executed at runtime. Depending on who controls the keys we may, very well, "need to worry about the software being signed with some third party’s key" if not to boot, then to run.