<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Environment on Rootcommit WIP</title>
    <link>https://rootcommit.l0g.eu/tags/environment/</link>
    <description>Recent content in Environment on Rootcommit WIP</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://rootcommit.l0g.eu/tags/environment/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>U-Boot: protect sensitive environment variables</title>
      <link>https://rootcommit.l0g.eu/2026/u-boot-protect-sensitive-environment-variables/</link>
      <pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2026/u-boot-protect-sensitive-environment-variables/</guid>
      <description>&lt;p&gt;This is a follow-up from our &lt;a href=&#34;https://rootcommit.l0g.eu/2026/accessing-u-boot-env-from-c/&#34;&gt;Accessing the U-Boot environment from a C program&lt;/a&gt; blog post.&lt;/p&gt;&#xA;&lt;h3 id=&#34;need-to-protect-the-environment&#34;&gt;🌳Need to protect the environment&lt;/h3&gt;&#xA;&lt;p&gt;When you&amp;rsquo;re trying to harden an embedded Linux device to make it more resistant to attacks, one key part to secure is the bootloader, because that&amp;rsquo;s the part that boots the operating system. Even you implement a &lt;strong&gt;secure boot&lt;/strong&gt; chain, if an attacker manages to interrupt the boot process and get access to the bootloader shell, this attacker would be able to load and run her/his own payload on the device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Oh My Zsh - Improve your shell experience</title>
      <link>https://rootcommit.l0g.eu/2024/oh-my-zsh-improve-your-shell-experience/</link>
      <pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2024/oh-my-zsh-improve-your-shell-experience/</guid>
      <description>&lt;h3 id=&#34;introduction&#34;&gt;Introduction&lt;/h3&gt;&#xA;&lt;p&gt;Have you already seen people making presentations which a fancy shell prompt like the above? This is particularly useful in presentations because viewers can clearly see in which directory the commands are being run.&lt;/p&gt;&#xA;&lt;p&gt;The second great feature is for developers. When the current directory is in a &lt;em&gt;Git&lt;/em&gt; repository, the prompt shows the current branch and its status, using a color that reveals whether there are uncommitted changes or not.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
