ARMed with Arch | LINUX Unplugged 80
Posted on: February 17, 2015
Posted in: Featured, LINUX Unplugged, Video

One of the core developers of Arch Linux ARM joins us to chat about this rapidly developing platform, how Arch is used in ARM deployments & their relationship with the main Arch project.
Plus an update on Ubuntu Phone & the first fully sandboxed portable Linux desktop app is demoed this week. How is it different than what we’ve seen before? And how far away might it be? We debate.
Direct Download:
MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube
RSS Feeds:
MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed
Become a supporter on Patreon:
Show Notes:
Pre-Show:
-
Linux-Sale – Get Games – official online digital download retailer
-
Matrix.org | A new basis for open, distributed, real-time communication
FU:
Linux Academy
-
Retro LAS next Sunday w/light crew at JB1, but live recording SCALE coverage.
LinuxFest Northwest 2015
Bellingham, WA • April 25th & 26th
DigitalOcean
Arch Linux ARM
Jason Plum (WarheadsSE) – OxNAS specialist, Perlmonger, and once again, another one of the smartest guys we know. Available as a hired gun for ARM projects.
TING
First fully sandboxed Linux desktop app | Alexander Larsson
This is going to require a lot of changes to the Linux stack. For instance, we have to use Wayland instead of X11, because X11 is impossible to secure. We also need to use kdbus to allow desktop integration that is properly filtered at the kernel level.
Recently Wayland has made some pretty big strides though, and we now have working Wayland sessions in Fedora 21. This means we can start testing real sandboxing for simple applications. To get something running I chose to focus on a game, because they require very little interaction with the system. Here is a video I made of Neverball, running in a minimal sandbox.
- Is independent of the host distribution
- Has no access to any system or user files other than the ones from the runtime and application itself
- Has no access to any hardware devices, other than DRI (for GL rendering)
- Has no network access
- Can’t see any other processes in the system
- Can only get input via Wayland
- Can only show graphics via Wayland
- Can only output audio via PulseAudio
- … plus more sandboxing details
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | Ars Technica
In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific conference they attended in Houston. The scientists didn’t know it then, but the disc also delivered a malicious payload developed by a highly advanced hacking operation that had been active since at least 2001. The CD, it seems, was tampered with on its way through the mail.
It wasn’t the first time the operators—dubbed the “Equation Group” by researchers from Moscow-based Kaspersky Lab—had secretly intercepted a package in transit, booby-trapped its contents, and sent it to its intended destination. In 2002 or 2003, Equation Group members did something similar with an Oracle database installation CD in order to infect a different target with malware from the group’s extensive library. (Kaspersky settled on the name Equation Group because of members’ strong affinity for encryption algorithms, advanced obfuscation methods, and sophisticated techniques.)
Kaspersky researchers have documented 500 infections by Equation Group in at least 42 countries, with Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali topping the list. Because of a self-destruct mechanism built into the malware, the researchers suspect that this is just a tiny percentage of the total; the actual number of victims likely reaches into the tens of thousands.
Next week: Retro edition of LUP. Your favorite moments, now available with the self gratifying feature known has hindsight.
Runs Linux from the people:
- Send in a pic/video of your runs Linux.
- Please upload videos to YouTube and submit a link via email or the subreddit.