What is Nostr?
SimplifiedPrivacy.com
npub14sl…t5d6
2024-01-31 00:45:05

SimplifiedPrivacy.com on Nostr: The NSA made SELinux.. can you trust it? You might be using this right now without ...

The NSA made SELinux.. can you trust it?

You might be using this right now without even realizing it? Is that ok?

There’s this fancy word called “Mandatory Access Control” or MAC. Don’t be fooled by how big a word it is, it’s simple. It just decides what a file or program can access on the system with clearly defined rules and labels.

Think of the analogy of a nightclub. The bouncer at the front is like the firewall rules or you deciding to download it. But then once it’s inside the club, where can it go? Can it go into VIP? That badge you’d wear for VIP is like MAC, it’s labels that define what stuff can do or access.

There’s two main MACs, SELinux and AppArmor. SELinux is stronger security, but it’s made by the NSA. AppArmor is less strong, but easier to use.

What has SELinux by default?
All Android phones
Fedora
ParrotOS

What has AppArmor?
Whonix
Tails

Ok so the NSA made SELinux, and it scores higher on security audits and has more fine-grained control. But can you trust it? I’ll present some pros & cons, but keep in mind that this article is heavily biased against authority and not neutral.

Pro: It’s open source and been reviewed by many

Con: Most vocal anti-government groups aren’t well-funded. I question how many independent non-American influenced audits it’s had. You’d need massive expertise and money to do this. Do Russian hackers trust it? Doubt it.

The NSA backdoored into OpenSSL, which had MANY people review it. [3] This proves both that its possible to deceive rigorous inspection in the real world, and the NSA has a history of doing so.

It’s also been proven in academic study that malicious code can be inserted even into inspected open source. The contest nicknamed “The Underhanded C Contest” from Binghamton University had contestants purposefully create malicious code to pass open source inspection. Some entries were able to not only pass even strict scrutiny and win, but did so with very low amounts of characters maliciously used. [4] And these are academic students, so if they can do it, then so can the NSA.

Pro: I question the skill of the researchers doing the Underhanded C audits compared to SELinux or the Kernel. In fact, it’s in the Linux kernel already. So you can’t hide anyway

Con: Support for it is not the same as actively using it with it enabled. That’s like saying owning a gun is the same as shooting your balls off
_______________________________________

Pro: The only guy I trust, Edward Snowden, promotes GrapheneOS all the time, and that’s SELinux. You’d think he’d mention if he knew the NSA had a backdoor into ALL android phones, and SELinux was made before his leaks.

Con: Security expert Bruce Schneier has pointed out the NSA has put backdoors in encryption standards in the past [1], and when he posted about the NSA making SELinux on his own website, he didn’t comment [2]. Which I interpret in my personal subjective analysis that he doesn’t trust it, suspects a backdoor, but can’t prove it.
_______________________________________

Pro: AppArmor starts up slower than SELinux. So Fedora by default is faster than Ubuntu/Debian.

Con: True, that’s valid. But keep in mind SELinux is complex, so you’re wasting hours/days learning something to save a second?
_______________________________________

Pro: SELinux restricts access by default, which is far more secure than AppArmor’s default permissiveness. Furthermore, SELinux gives much more fine-grained control, by allowing you to label files, which is based on their true purpose. While as AppArmor bases it on the file path, which is a weaker way to do it.

Con:, True. But SELinux is more complex and requires newer users to debug errors. So it’s only more secure if you actually know what you’re doing. Otherwise, you may be allowing malicious software higher access than it needs, just to get rid of confusing errors.

Pro: That’s a good point, but AppArmor doesn’t even have the ability to do complex setups for large organizations with critical needs.

Con: If SELinux is so complex, how can we trust these open source audits?

_______________________________________

Conclusion

In conclusion, many academic and corporate researchers praise SELinux over AppArmor for security, and it’s easy to see why large organizations use it. However, for a lone wolf individual with an extreme distrust of the NSA, it’s easy to see why they wouldn’t, even if it’s open source. And if you are bugging out bro, consider subscribing on Session messenger with the Session ID: Simple.

Sources: https://simplifiedprivacy.com/selinux/
Author Public Key
npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6