U-Boot: protect sensitive environment variables
This is a follow-up from our Accessing the U-Boot environment from a C program blog post.
🌳Need to protect the environment
When you’re trying to harden an embedded Linux device to make it more resistant to attacks, one key part to secure is the bootloader, because that’s the part that boots the operating system. Even you implement a secure boot chain, if an attacker manages to interrupt the boot process and get access to the bootloader shell, this attacker would be able to load and run her/his own payload on the device.
Oh My Zsh - Improve your shell experience
Introduction
Have you already seen people making presentations which a fancy shell prompt like the above? This is particularly useful in presentations because viewers can clearly see in which directory the commands are being run.
The second great feature is for developers. When the current directory is in a Git repository, the prompt shows the current branch and its status, using a color that reveals whether there are uncommitted changes or not.