[Git][reproducible-builds/reproducible-website][master] venice 2022: move https://pad.riseup.net/p/rbsummmit2022-firmware-keep to here
Holger Levsen (@holger)
gitlab at salsa.debian.org
Tue Jan 24 12:43:58 UTC 2023
Holger Levsen pushed to branch master at Reproducible Builds / reproducible-website
Commits:
af639729 by Holger Levsen at 2023-01-24T13:43:46+01:00
venice 2022: move https://pad.riseup.net/p/rbsummmit2022-firmware-keep to here
Signed-off-by: Holger Levsen <holger at layer-acht.org>
- - - - -
2 changed files:
- _events/venice2022/agenda.md
- + _events/venice2022/firmware.md
Changes:
=====================================
_events/venice2022/agenda.md
=====================================
@@ -93,9 +93,9 @@ Day 3 - Thursday, November 3rd
* The day started with a summary of Day 2 outcomes and a Day 3 Agenda Overview.
* 9.30 Collaborative Working Sessions, break-out discussions continue.
* Verifying packages at installation discussion (in-toto): FIXME https://pad.riseup.net/p/rbsummmit2022-installation-keep
- * [taxonomy]({{ "/events/venice2022/taxonomy/" | relative_url }})
+ * [Taxonomy]({{ "/events/venice2022/taxonomy/" | relative_url }})
* Debian FIXME https://pad.riseup.net/p/rbsummmit2022-debian-keep
- * Firmware FIXME https://pad.riseup.net/p/rbsummmit2022-firmware-keep
+ * [Firmware]({{ "/events/venice2022/firmware/" | relative_url }})
* 10.45 Break
* 11.00 Collaborative Working Sessions, break-out discussions continue.
* in-toto vs sbom (spdx) FIXME https://pad.riseup.net/p/rbsummmit2022-intoto-vs-sbom
=====================================
_events/venice2022/firmware.md
=====================================
@@ -0,0 +1,50 @@
+---
+layout: event_detail
+title: Collaborative Working Sessions - Firmware
+event: venice2022
+order: 130
+permalink: /events/venice2022/firmware
+---
+
+Reproducible Builds Summit 2022
+
+- What is Firmware
+ - Integrated software components
+ - Software w/o user interaction
+ - Usually means cross-compilation
+ - Usually "closed" systems with minimal user control
+ - Often limited resources (memory, cpu)
+- Build processes
+ - Open vs. closed toolchains
+ - Some are closed source
+ - Some are GCC (sometimes with patches)
+ - Some are clang
+ - Some are "something else" (sdcc?)
+- UEFI
+ - many laptops won't allow changing the firmware
+ - intel bootguard
+ - in theory, you could reproduce it and verify, but this is hard due to closed-sourced components and unknown contents
+ - should be reproducable if you build coreboot
+ - more of a political challenge than technical
+ - need access to source, toolchains, etc...
+- projects/companies that are involved w/ reproducable builds
+ - coreboot
+ - openwrt
+ - yocto
+ - openembedded
+ - trezor (crypto wallet)
+ - mullvad (vpn provider)
+- Benefits to end-users
+ - users can't trust their devices without knowing where the firmware came from
+ - companies purchasing equipment (network gear, etc...) have a strong need to trust the devices
+ - potential for "software escrow"
+- Some devices have higher trust needs
+ - 2FA tokens
+ - network hardware
+ - crypto wallets
+- Legal stuff
+ - Stricter GPL version that requires reproducability?
+- Why don't people do RB firmware now?
+ - they don't know about it
+ - they don't see benefit in it
+ - cost sensitivity
View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/af6397293c6c4eb684c9f90284a7d10ff72bd0e1
--
View it on GitLab: https://salsa.debian.org/reproducible-builds/reproducible-website/-/commit/af6397293c6c4eb684c9f90284a7d10ff72bd0e1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20230124/98f6e517/attachment.htm>
More information about the rb-commits
mailing list