<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Rootcommit WIP</title>
    <link>https://rootcommit.l0g.eu/tags/security/</link>
    <description>Recent content in Security on Rootcommit WIP</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://rootcommit.l0g.eu/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>U-Boot: protect sensitive environment variables</title>
      <link>https://rootcommit.l0g.eu/2026/u-boot-protect-sensitive-environment-variables/</link>
      <pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2026/u-boot-protect-sensitive-environment-variables/</guid>
      <description>&lt;p&gt;This is a follow-up from our &lt;a href=&#34;https://rootcommit.l0g.eu/2026/accessing-u-boot-env-from-c/&#34;&gt;Accessing the U-Boot environment from a C program&lt;/a&gt; blog post.&lt;/p&gt;&#xA;&lt;h3 id=&#34;need-to-protect-the-environment&#34;&gt;🌳Need to protect the environment&lt;/h3&gt;&#xA;&lt;p&gt;When you&amp;rsquo;re trying to harden an embedded Linux device to make it more resistant to attacks, one key part to secure is the bootloader, because that&amp;rsquo;s the part that boots the operating system. Even you implement a &lt;strong&gt;secure boot&lt;/strong&gt; chain, if an attacker manages to interrupt the boot process and get access to the bootloader shell, this attacker would be able to load and run her/his own payload on the device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Accessing the U-Boot environment from a C program</title>
      <link>https://rootcommit.l0g.eu/2026/accessing-u-boot-env-from-c/</link>
      <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2026/accessing-u-boot-env-from-c/</guid>
      <description>&lt;h3 id=&#34;need-to-modify-the-u-boot-environment-from-linux&#34;&gt;Need to modify the U-Boot environment from Linux&lt;/h3&gt;&#xA;&lt;!-- raw HTML omitted --&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/update-and-recovery.excalidraw-scaled.png&#34; alt=&#34;Update and Recovery Management with SWUpdate and U-Boot&#34;&gt;&lt;/p&gt;&#xA;&lt;!-- raw HTML omitted --&gt;&#xA;&lt;p&gt;A/B update and recovery workflow implemented for a Root Commit customer&lt;/p&gt;&#xA;&lt;!-- raw HTML omitted --&gt;&#xA;&lt;!-- raw HTML omitted --&gt;&#xA;&lt;p&gt;There are multiple reasons for wanting to modify U-Boot variables from Linux, one of them being to implement &lt;a href=&#34;https://bootlin.com/pub/conferences/2022/elce/opdenacker-implementing-A-B-system-updates-with-u-boot/opdenacker-implementing-A-B-system-updates-with-u-boot.pdf&#34;&gt;A/B update mechanisms&lt;/a&gt;. Typically, after you&amp;rsquo;ve flashed a device with a new version, you&amp;rsquo;ll set the &lt;code&gt;upgrade_available&lt;/code&gt; U-Boot variable to &lt;code&gt;1&lt;/code&gt;, reboot, and let U-Boot try to boot the new version.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Yocto security: Kernel Hardening</title>
      <link>https://rootcommit.l0g.eu/2025/yocto-security-kernel-hardening/</link>
      <pubDate>Tue, 07 Oct 2025 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2025/yocto-security-kernel-hardening/</guid>
      <description>&lt;p&gt;This is another blog post about securing your Yocto built systems:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://rootcommit.l0g.eu/2025/securing-yocto-built-systems/&#34;&gt;Securing Yocto Built Systems overview presentation slides&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://rootcommit.l0g.eu/2025/yocto-security-production-and-development-images/&#34;&gt;Yocto Security: Production and Development Images&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://rootcommit.l0g.eu/2025/yocto-security-kernel-hardening/&#34;&gt;Yocto security: Kernel Hardening&lt;/a&gt; ⬅️&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;The Linux kernel is the cornerstone and stronghold of a Linux based system. Unlike user-space applications which run with limited privileges, if it&amp;rsquo;s compromised, there is almost no limit to what an attacker can do.&lt;/p&gt;&#xA;&lt;p&gt;While nothing is unbreakable, there are two types of settings you can change to make your kernel harder to compromise:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Digital hygiene: use USB tethering to connect your laptop</title>
      <link>https://rootcommit.l0g.eu/2025/usb-tethering-laptop/</link>
      <pubDate>Sun, 14 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2025/usb-tethering-laptop/</guid>
      <description>&lt;p&gt;When you are on the go, have you thought about connecting your GNU/Linux PC to the Internet through a USB connection to your phone?&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Using open networks is definitely not recommended. Your connection is not encrypted and others could intercept it. If you have no other choice, connecting to the Internet through a &lt;a href=&#34;https://en.wikipedia.org/wiki/Virtual_private_network&#34;&gt;Virtual Private Network&lt;/a&gt; (VPN) is strongly recommended.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Even using an untrusted WiFi network protected by a password (like in a hotel or in a commercial building) is not fully secure. If the password is shared, other guests could intercept your connection and try to attack your PC. Here, a VPN is recommended too.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Yocto Security: Production and Development Images</title>
      <link>https://rootcommit.l0g.eu/2025/yocto-security-production-and-development-images/</link>
      <pubDate>Thu, 04 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2025/yocto-security-production-and-development-images/</guid>
      <description>&lt;p&gt;This blog post is part of a series about securing your Yocto built systems:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://rootcommit.l0g.eu/2025/securing-yocto-built-systems/&#34;&gt;Securing Yocto Built Systems overview presentation slides&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://rootcommit.l0g.eu/2025/yocto-security-production-and-development-images/&#34;&gt;Yocto Security: Production and Development Images&lt;/a&gt; ⬅️&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://rootcommit.l0g.eu/2025/yocto-security-kernel-hardening/&#34;&gt;Yocto security: Kernel Hardening&lt;/a&gt;&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;what-to-avoid&#34;&gt;What to avoid&lt;/h3&gt;&#xA;&lt;p&gt;So, you use Yocto to build an image for your embedded device. You tweak the image and distribution settings to get the features you need, and other developers use the SDK built by Yocto to create and build the User Interface and other applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>&#34;Securing Yocto Built Systems&#34; presentation slides</title>
      <link>https://rootcommit.l0g.eu/2025/securing-yocto-built-systems/</link>
      <pubDate>Wed, 03 Sep 2025 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2025/securing-yocto-built-systems/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;../images/whole-room-1024x768.jpg&#34; alt=&#34;Showing a room full of people&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/with-tim-orling.png&#34; alt=&#34;Discussion after the presentation at ELCE 2025 in Amsterdam&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/multiple-images-scaled.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/kernel-hardening-1024x576.png&#34; alt=&#34;Kernel Hardening slide from ELCE 2025 presentation&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/kernel-hardening-checker-output-1024x576.png&#34; alt=&#34;kernel-hardening-checker output&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/vulnscout-1024x576.png&#34; alt=&#34;Vulnscout for vulnerability scanning from Yocto SPDX&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/badge-576x1024.jpg&#34; alt=&#34;ELCE 2025 speaker badge for Michael Opdenacker, Root Commit&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/slate-576x1024.jpg&#34; alt=&#34;OSS Europe Amsterdam Speaker Gift Slate&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/penguin-576x1024.jpg&#34; alt=&#34;&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Last week, I gave a &amp;ldquo;Making Yocto Built Images More Secure&amp;rdquo; presentation at the &lt;a href=&#34;https://embeddedlinuxconference.com/&#34;&gt;Embedded Linux Conference&lt;/a&gt; in Amsterdam.&lt;/p&gt;&#xA;&lt;p&gt;The main goal was to share the research I&amp;rsquo;ve done so far for a customer project, and gather feedback from the audience.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Google-stored passwords insufficiently protected</title>
      <link>https://rootcommit.l0g.eu/2025/google-stored-passwords-insufficiently-protected/</link>
      <pubDate>Tue, 11 Mar 2025 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2025/google-stored-passwords-insufficiently-protected/</guid>
      <description>&lt;p&gt;Have you checked the &lt;a href=&#34;https://passwords.google.com&#34;&gt;passwords.google.com&lt;/a&gt; page? If you have a Google account, it&amp;rsquo;s the passwords that you&amp;rsquo;ve supposedly allowed Google to remember for you.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;../images/google-password-manager1-246x300.png&#34; alt=&#34;Screenshot of passwords.google.com&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;In my case, I have a very limited list, and it&amp;rsquo;s so old that I don&amp;rsquo;t even remember letting Google remember them. I most probably accepted this on an Android phone, hoping that the system would store them in a secure way.&lt;/p&gt;&#xA;&lt;p&gt;However, these are still valid passwords that are poorly protected:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Digital Hygiene presentation</title>
      <link>https://rootcommit.l0g.eu/2024/digital-hygiene-presentation/</link>
      <pubDate>Tue, 10 Sep 2024 00:00:00 +0000</pubDate>
      <guid>https://rootcommit.l0g.eu/2024/digital-hygiene-presentation/</guid>
      <description>&lt;p&gt;Here&amp;rsquo;s a presentation I prepared for high school students in my area, but which actually targets any computer and smartphone user. Here are the main topics:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Get familiar with the biggest threats. Also learn about less frequent but also more advanced threats.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Protect your personal information and that of your contacts.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Protect your computer, your smartphone and the data they contain.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Improve your daily practice and the durability of your data.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;The presentation is available in &lt;a href=&#34;https://gitlab.com/michaelopdenacker/digital-hygiene/-/raw/main/digital-hygiene.pdf&#34;&gt;English&lt;/a&gt; and in &lt;a href=&#34;https://gitlab.com/michaelopdenacker/digital-hygiene/-/raw/main/hygiene-numerique.pdf&#34;&gt;French&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
