<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jonathan Duchnowski &#8211; Purism</title>
	<atom:link href="https://puri.sm/posts/author/jonathan-duchnowski/feed/" rel="self" type="application/rss+xml" />
	<link>https://puri.sm/</link>
	<description>High-quality laptops that protect your freedom and privacy</description>
	<lastBuildDate>Mon, 09 Nov 2020 16:41:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.16</generator>

<image>
	<url>https://puri.sm/wp-content/uploads/2020/04/cropped-purism-logo-rectangle-1-32x32.png</url>
	<title>Jonathan Duchnowski &#8211; Purism</title>
	<link>https://puri.sm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Purism Attends Chaos Communication Congress</title>
		<link>https://puri.sm/posts/purism-attends-chaos-communication-congress/</link>
		<pubDate>Fri, 22 Dec 2017 17:49:43 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Duchnowski]]></dc:creator>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software freedom]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=46159</guid>
		<description><![CDATA[<p>We are attending the Chaos Communication Congress between December 27th &#8211; 30th in Leipzig, Germany. This is one of the largest gatherings of people who are interested in computer security, cryptography, privacy, and free speech in the world. Two of our staff will be attending the event. Youness Alaoui and Zlatan Todoric hope to connect [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-attends-chaos-communication-congress/">Purism Attends Chaos Communication Congress</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<figure id="attachment_46271" style="width: 154px" class="wp-caption alignright"><img class="wp-image-46271 size-full" src="https://puri.sm/wp-content/uploads/2017/12/l_chaosknoten_1.png" alt="" width="154" height="69" /><figcaption class="wp-caption-text">Chaos Computer Club hosts the CCC</figcaption></figure>
<p>We are attending the Chaos Communication Congress between December 27th &#8211; 30th in Leipzig, Germany. This is one of the largest gatherings of people who are interested in computer security, cryptography, privacy, and free speech in the world.</p>
<p>Two of our staff will be attending the event. Youness Alaoui and Zlatan Todoric hope to connect with those going or who are interested in learning more about the Congress. Please contact them on #Purism IRC channel on Freenode. Zlatan&#8217;s handle is <em>zlatan</em>, and Youness&#8217; handle is <em>KaKaRoTo</em>.</p>
<p>They can&#8217;t wait to meet you at the Chaos Communication Congress!</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/purism-attends-chaos-communication-congress/">Purism Attends Chaos Communication Congress</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>PureOS now features AppArmor activated by default</title>
		<link>https://puri.sm/posts/pureos-apparmor-activated-by-default/</link>
		<pubDate>Wed, 20 Dec 2017 22:07:47 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Duchnowski]]></dc:creator>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[FLOSS applications]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<category><![CDATA[Newsletter and status updates]]></category>
		<category><![CDATA[PureOS]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://puri.sm/?p=45057</guid>
		<description><![CDATA[<p>Purism, the Social Purpose Corporation focused on software freedom, privacy and security, proves it is dedicated to making its products secure straight off of the factory floor. Now, new PureOS installations (including those provided with Librem devices) have AppArmor activated by default. Let us first look at what AppArmor is, and then why we chose [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-apparmor-activated-by-default/">PureOS now features AppArmor activated by default</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Purism, the Social Purpose Corporation focused on software freedom, privacy and security, proves it is dedicated to making its products secure straight off of the factory floor. Now, new PureOS installations (including those provided with Librem devices) have <strong>AppArmor activated by default. </strong>Let us first look at what AppArmor is, and then why we chose it specifically to strengthen PureOS.<span id="more-45057"></span></p>
<h1>What is AppArmor, technically speaking?</h1>
<p><img class="wp-image-46165 alignright" src="https://puri.sm/wp-content/uploads/2017/12/1_Z5dyJHln1PvCE3HYZLOAKA-300x140.png" alt="" width="374" height="175" srcset="https://puri.sm/wp-content/uploads/2017/12/1_Z5dyJHln1PvCE3HYZLOAKA-300x140.png 300w, https://puri.sm/wp-content/uploads/2017/12/1_Z5dyJHln1PvCE3HYZLOAKA.png 450w" sizes="(max-width: 374px) 100vw, 374px" /></p>
<p>AppArmor falls into a category of security software called Mandatory Access Control (MAC) enacted through a Linux Security Module (LSM).</p>
<p>MAC is a security protocol that restrains the ability of individual resource owners to grant or deny access to objects in a computer system which is accomplished by defining criteria from the System Administrator to be enforced by the Operating System. The key factor that makes this protocol very secure is that access control policies cannot be altered by end users since the policies bypass user and application settings which might inadvertently or purposefully violate system security. All applications installed on a system with MAC have access control policies that interact directly with the kernel. On GNU/Linux systems the only user capable of making changes to the Operating System kernel is an administrator account, or Root, which means that unprivileged user accounts cannot override system critical settings. This is a primary reason GNU/Linux is commonly considered one of the most secure Operating Systems available.</p>
<p>Linux Security Modules are an integrated part of the Linux kernel&#8217;s modularity. Kernel modules are software loadable on demand if and when the functionality they provide is required or requested, such as device drivers. Modules provide a couple of benefits:</p>
<ol>
<li>One benefit is reducing the overall size of the mainline kernel based only on system needs, which reduces storage space requirements, CPU and RAM usage.</li>
<li>The second benefit is the ability to activate and deactivate modules on an active system without rebooting the entire system. You may have heard of this function before as &#8216;hotplugging&#8217; devices.</li>
<li>Security modules allow freedom of choice to your system administrators by allowing Root user access to define which access control software to use. As with all kernel modules this functionality is optional and your computer will continue to function with LSM disabled.</li>
</ol>
<p>AppArmor is one of the MACs included in the mainline Linux kernel as an optional LSM and it is the one that Purism deemed excellent enough to protect their Librem devices.</p>
<h1>Why AppArmor?</h1>
<p>Now that we&#8217;ve gotten past all of the technical details we can address the obvious burning question: <em>Why?</em></p>
<p>In theory, software developers try to write stable programs that <em>shouldn&#8217;t</em> exploit your system. In practice, all software has bugs, and even though developers do their best to debug their code before release, there is always the <em>possibility</em> of bugs having gone unnoticed and turning into security issues. A lot of security issues stem from the fact that the person coding your word processor or music player isn&#8217;t necessarily a hardware or security expert. A software developer for desktop applications may not intend on allowing exploitable code into their applications, but to err is human, and so it <em>can</em> happen.</p>
<p>AppArmor can be thought of as &#8220;immunization&#8221; for your Operating System, using the concept of &#8220;minimum privilege required&#8221; applied on a case by case basis for each application profiled. This means that protected applications are selected through evaluation of system risk.</p>
<p>Of course, fundamentally, any type of MAC limits an end-user&#8217;s ability to use their computer. The general tendency for many users of other security systems has been to disable security functions that potentially affect ease-of-use, calling them unnecessarily strict. This situation happens often in situations where users are left &#8220;on their own&#8221; without a support team or IT department to set up and monitor security protocols; a system administrator can adjust access control profiles to ensure applications perform correctly with security still in place. This is where AppArmor shines: the intuitive nature of profile authoring as well as excellent technical documentation allows efficient generation and testing security policies, and the Purism R&amp;D team takes on the job of doing this work for you in PureOS so that you can use PureOS worry-free.</p>
<p>AppArmor is <a href="https://en.wikipedia.org/wiki/Free_and_open-source_software" target="_blank" rel="noopener">Free software</a>, which is important to Purism&#8217;s ethics. Access to source code allows auditing code which ensures you that no malicious code is in your system, but it also allows for rapid bug identification and fixing. This is important since the pace of software development is currently very fast. Proprietary operating systems may claim to have native system security in place in their core, but you would never know if it really exists or works as promised because you can&#8217;t audit their code. We&#8217;re not that kind of company! Purism cares to provide users&#8217; privacy and security that they can <em>trust,</em> and this requires users to be allowed to access the source code if they want to.</p>
<p>This is why the Purism development team worked hard to set up AppArmor so that it can be activated by default in PureOS, so that every Librem device that gets shipped is as secure and trustworthy as it should be.</p>
<p>The post <a rel="nofollow" href="https://puri.sm/posts/pureos-apparmor-activated-by-default/">PureOS now features AppArmor activated by default</a> appeared first on <a rel="nofollow" href="https://puri.sm/">Purism</a>.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>
