-
+
OpenBSD 4.8 Released!
www.undeadly.org, November 1, 2010
@@ -2038,7 +2043,7 @@
disclosing traffic, and it could even introduce a subtle backdoor
into the operating system itself (much the same as any device driver
in a closed source operating system).
-
+
[A]lthough some of these scenarios are a
little far-fetched, the possibility for them to exist is there...
Ultimately it becomes an issue of trust, which is a cornerstone of
@@ -2163,10 +2168,10 @@
Starts with the question:
"... which is more secure - Windows or Linux?
-
+
A snide answer is OpenBSD, which has an exemplary record with respect to
security. But let's stick to the two most broadly used platforms in IT today.
-
+
Microsoft's hired analysts claim that Windows is more secure than Linux.
Should we believe them?"
@@ -2584,7 +2589,7 @@
Fosdem
Interview: Henning Brauer,
Fosdem 2004, January 6, 2004.
-
+
A brief interview with Henning Brauer conducted as the Fosdem conference
approaches. Henning talks about changes in 3.4, in -current, and the
BGP daemon he's been working on for the past few months.
@@ -2596,7 +2601,7 @@
Outside Looking In: The BSD Operating Systems,
eWeek, October 31, 2003.
-
+
A commentary on all of the BSDs and what kind of commercial success they've
enjoyed. While Steven J. Vaughan-Nichols notes that Linux is easier to
install and configure than the freely available BSDs, he does continually
@@ -2607,7 +2612,7 @@
VIA wows
with nano-sized x86, entropy-based security, tiny PCs,
LinuxDevices.com, October 15, 2003.
-
+
Another article which extracts heavily from the VIA press release
and includes a quote from Theo de Raadt about OpenBSD support for the
processor. Additionally, it shows a photo of the processor next to a US
@@ -2621,7 +2626,7 @@
Power Native x86 Processor with Industry's Most Advanced Embedded Security
Features,
Press Release, October 14, 2003.
-
+
VIA announces a new small, low power native x86 processor with an
integrated multi-mode AES implementation. Theo de Raadt is quoted as
saying, "There's just no way to describe how happy we were to find such an
@@ -2643,7 +2648,7 @@
Adding System Calls (an OpenBSD Example),
O'Reilly Net OnLamp.com BSD DevCenter, October 9, 2003.
-
+
Another O'ReillyNet article about OpenBSD by an OpenBSD developer. This
one, by Kevin Lo, is a quick introduction to the modification of the
OpenBSD kernel to support a new system call. Example code is included.
@@ -2653,7 +2658,7 @@
Diving
into GCC: OpenBSD and m88k,
O'Reilly Net OnLamp.com BSD DevCenter, October 2, 2003.
-
+
Our own Miod Vallat discusses how he learned to stop fearing GCC
by just getting down and messing with its internals.
Since he "started with almost zero gcc internals knowledge, it
@@ -3055,7 +3060,7 @@
April 24, 2003.
($ registration required; free after May 1, 2003).
- More detailed discussion of why the funding was cut, by whom
+ More detailed discussion of why the funding was cut, by whom
and when. Concludes that the funding cut "may not be as dramatic
as it sounds", since OpenBSD has other sources of funding.
@@ -3083,7 +3088,7 @@
sympathetic to the American military's current role in world
affairs." Notes the discrepancy between DARPA's public position
and what the people working on the UPenn project have been told.
-
+
Describes Theo de Raadt as "A respected Canadian computer programmer ...
the 35-year-old founder of an international collaborative software project
known as OpenBSD", and quotes him as saying that the hackathon will go on:
@@ -3562,11 +3567,11 @@
The editors speak strongly in favor of the team's efforts
in producing reliable, bug-free software;
quoting two of them:
- (Ranum): It's GREAT to see that at least a few people are smart enough
+ (Ranum): It's GREAT to see that at least a few people are smart enough
to try to attack problems like this systemically, rather than keeping
stuck in the fruitless "penetrate and patch" while loop. This is how
to make progress in security: fundamental protections.
- (Shpantzer): Initiatives like this should be taught as case studies
+ (Shpantzer): Initiatives like this should be taught as case studies
in computer science courses at the undergraduate level.