EdgeSecurity's profile picture. Tweets from @zx2c4. Security Research & Consulting. Support WireGuard development via https://patreon.com/zx2c4  https://wireguard.com/donations/ . Or hire us.

Edge Security

@EdgeSecurity

Tweets from @zx2c4. Security Research & Consulting. Support WireGuard development via https://patreon.com/zx2c4 https://wireguard.com/donations/ . Or hire us.

vDSO getrandom() objective complete!

EdgeSecurity's tweet image. vDSO getrandom() objective complete!

Glibc 2.41 will support vDSO getrandom(): sourceware.org/git/?p=glibc.g…


Edge Security reposted

vDSO getrandom() Ported To Five More CPU Architectures With Linux 6.12 phoronix.com/news/Linux-6.1…


vDSO getrandom() has now been ported to arm64, powerpc64, powerpc32, s390x, and loongarch64, in addition to the prior x86_64 port: lore.kernel.org/all/2024091612…


Direct APK downloads for WireGuard for Android are now available: lore.kernel.org/wireguard/ZGIo…

EdgeSecurity's tweet image. Direct APK downloads for WireGuard for Android are now available: lore.kernel.org/wireguard/ZGIo…

WireGuard is the first reproducible build package on F-Droid that has a fully verified signature path. The WireGuard Project builds WireGuard from source, and then signs the resultant APK with a private key stored in an HSM. F-Droid’s build server downloads that source and does…

EdgeSecurity's tweet image. WireGuard is the first reproducible build package on F-Droid that has a fully verified signature path.

The WireGuard Project builds WireGuard from source, and then signs the resultant APK with a private key stored in an HSM. F-Droid’s build server downloads that source and does…

Edge Security reposted

Well, there is one cool use in the #Linux kernel #wireguard by @zx2c4: git.kernel.org/pub/scm/linux/…


v7 posted of the vDSO getrandom() series: lore.kernel.org/lkml/202211241… , with a stackless ChaCha20 implementation on x86-64, as well as a corresponding patch to wire this up for glibc from @adhemerval - github.com/bminor/glibc/c… . I'm daily driving this on my laptop's libc.

EdgeSecurity's tweet image. v7 posted of the vDSO getrandom() series: lore.kernel.org/lkml/202211241… , with a stackless ChaCha20 implementation on x86-64, as well as a corresponding patch to wire this up for glibc from @adhemerval - github.com/bminor/glibc/c… . I'm daily driving this on my laptop's libc.
EdgeSecurity's tweet image. v7 posted of the vDSO getrandom() series: lore.kernel.org/lkml/202211241… , with a stackless ChaCha20 implementation on x86-64, as well as a corresponding patch to wire this up for glibc from @adhemerval - github.com/bminor/glibc/c… . I'm daily driving this on my laptop's libc.
EdgeSecurity's tweet image. v7 posted of the vDSO getrandom() series: lore.kernel.org/lkml/202211241… , with a stackless ChaCha20 implementation on x86-64, as well as a corresponding patch to wire this up for glibc from @adhemerval - github.com/bminor/glibc/c… . I'm daily driving this on my laptop's libc.

This RFC patchset for the Linux kernel proposes using an EFI non-volatile variable as a persistent RNG seed that the kernel's EFISTUB can manage transparently and automatically. Very cool if it works. A question about using variables that way. lore.kernel.org/linux-efi/2022…

EdgeSecurity's tweet image. This RFC patchset for the Linux kernel proposes using an EFI non-volatile variable as a persistent RNG seed that the kernel's EFISTUB can manage transparently and automatically. Very cool if it works. A question about using variables that way. lore.kernel.org/linux-efi/2022…
EdgeSecurity's tweet image. This RFC patchset for the Linux kernel proposes using an EFI non-volatile variable as a persistent RNG seed that the kernel's EFISTUB can manage transparently and automatically. Very cool if it works. A question about using variables that way. lore.kernel.org/linux-efi/2022…

#systemd's EFI bootloader, systemd-boot, will now pass the on-disk RNG seeds it manages directly to the Linux kernel, so that the RNG is seeded by them before userspace runs. github.com/systemd/system…

EdgeSecurity's tweet image. #systemd's EFI bootloader, systemd-boot, will now pass the on-disk RNG seeds it manages directly to the Linux kernel, so that the RNG is seeded by them before userspace runs. github.com/systemd/system…

Loading...

Something went wrong.


Something went wrong.