In this blog post we will talk about module signing keys in a situation where the entity developing and signing kernel modules cannot build in their keys.
Continue reading...linux
Yocto Hardening: Kernel Module Signing
This time we have a relatively simple and effective hardening measure that may prevent big headaches: kernel module signing.
Continue reading...Yocto Hardening: Multi-Factor Authentication
In this blog post, I’ll show how to integrate Google Authenticator into a Yocto system to enhance the security of remote login flows.
Continue reading...Linux & FPGA, The Perfect Match?
FPGA, one of life’s big mysteries. Let’s combine Raspberry Pi 5 and Basys 3 boards and see how we can demonstrate communication between these two devices.
Continue reading...Encrypting In Yocto With fscryptctl
In this blog text I’ll briefly cover how to use fscryptctl to encrypt and decrypt directories in an embedded Linux system.
Continue reading...Yocto Hardening: File System Encryption with fscrypt
Let’s continue encryption with the second part and move on to file system encryption.
Continue reading...Yocto Hardening: Block Device Encryption with dm-crypt
Data safety is crucial in the embedded systems. The devices can store information that should be kept secret. Encryption can be used to achieve exactly that.
Continue reading...Linux Initramfs, With and Without Yocto
Let’s get started with an introduction of what an initramfs is, and then get into more technical stuff.
Continue reading...The First Steps With Buildroot
This text contains instructions on how to get started with Buildroot and some first impressions from a long-time Yocto developer.
Continue reading...Building a Karaoke Machine with Linux and UltraStar
Lately, the blog posts here have been quite serious: TPMs, virtualization, integrity checks, etc. However, those things are not the best thing about computers.
Continue reading...