| ▲ | kfreds 2 hours ago | |||||||
Exciting! It sounds like you want to achieve system transparency, but I don't see any clear mention of reproducible builds or transparency logs anywhere. I have followed systemd's efforts into Secure Boot and TPM use with great interest. It has become increasingly clear that you are heading in a very similar direction to these projects: - Hal Finney's transparent server - Keylime - System Transparency - Project Oak - Apple Private Cloud Compute - Moxie's Confer.to I still remember Jason introducing me to Lennart at FOSDEM in 2020, and we had a short conversation about System Transparency. I'd love to meet up at FOSDEM. Email me at fredrik@mullvad.net. Edit: Here we are six years later, and I'm pretty sure we'll eventually replace a lot of things we built with things that the systemd community has now built. On a related note, I think you should consider using Sigsum as your transparency log. :) Edit2: For anyone interested, here's a recent lightning talk I did that explains the concept that all project above are striving towards, and likely Amutable as well: https://www.youtube.com/watch?v=Lo0gxBWwwQE | ||||||||
| ▲ | davidstrauss 2 hours ago | parent | next [-] | |||||||
Hi, I'm David, founding product lead. Our entire team will be at FOSDEM, and we'd be thrilled to meet more of the Mullvad team. Protecting systems like yours is core to us. We want to understand how we put the right roots of trust and observability into your hands. Edit: I've reached out privately by email for next steps, as you requested. | ||||||||
| ||||||||
| ▲ | Phelinofist an hour ago | parent | prev [-] | |||||||
I'm super far from an expert on this, but it NEEDS reproducible builds, right? You need to start from a known good, trusted state - otherwise you cannot trust any new system states. You also need it for updates. | ||||||||
| ||||||||