No.17431
> M1 Macs also use Pointer Authentication Codes (PAC) to ensure forward and backward-edge protection. You might want to include this for that part:
https://www.kernel.org/doc/html/latest/arm64/pointer-authentication.html No.17436
Nice arguments
Too bad I didn't read them
No.17437
>>17436it's not "arguments", it's exposition of data /g/tard
If you use linux, it's worth taking a look at. I use qubes, i'm not anti-linux or anything. Knowledge is power comrade
No.17438
>>17437"exposition of data" have some balls you STEMlord
No.17609
bumppp
No.18186
tanenbaum was right about microkernels. having separate containers and systems that don't rely on each other is the most important thing in security right now. QubesOS literally runs a bunch of VMs, sandboxing sensitive ones from the safer ones (AdminVM, VaultVM…). Of course that won't happen to Linux because it's already a huge bloated codebase with millions of lines of code, so the only way out is doing something closer to OpenBSD, QubesOS or MINIX, if you don't want to contribute to those directly for some reason
No.18187
>>18186also, using a memory safe language is a must. C is completely outdated for modern OS development
No.18190
Linux was never designed to be a super duper tight-asshole security magic pill. If you want that, go deal with OpenBSD or whatever.
>>18187C can be memory-safe, it just requires a skilled eye for vulnerabilities instead of relying on a run-time program to handle it for you.
No.18192
>>18186HURD is already a functional OS!! It's microkerneled and modular all the way down