Microsoft Amutable Already Reveals That Its Focus Is Not Linux, It'll Promote "Remote Attestation"
Last month: Amutable’s Management and Founders Are 100% Microsoft! | Amutable is a Microsoft Proxy Like Xamarin, With Some IBM/Red Hat Staff Added for Good Measure
Earlier this year we explained what Amutable was all about. Don't be mistaken; it's a Microsoft company, not a GNU/Linux company. Those are opposite things.
Put another way, just like Xamarin, the point of this company is to shoehorn Microsoft into things that are not Microsoft's.
The report from IDG says LP (Poettering) "has alongside him two other ex-Microsoft employees, Chris Kühl as CEO, and Christian Brauner as CTO."
Everybody is Microsoft!
As someone puts it in a community friendly to ours, "systemd-securityd will simplify configuration and workflows. There is no way this will be misused or abused."
Another joke along the same lines: "Gaming on Linux, it's a thing these days. But Linux still isn't supported by the kernel-level DRM required by a lot of online AAA-games. Future games will require that systemd-securityd."
One person then says: "TPM is part of the death of open source operating systems, and that death is Microsoft's long term goal in launching Amutable. Take a look at the names again. This is most definitely the "Linux Crowd" here. It's not just Poettering but also the others there who are deployed from Microsoft. The TPM, UEFI, and DRM is not a mistake on their part. It is a primary goal. Don't be fooled into thinking that this is a project to advance either Linux or Open Source. It's the opposite."
Another says: "There is no history to suggest LP has the interest of the linux crowd in mind."
There are plenty of other good comments there.
German media with an English edition said: "With “Measured Boot,” the system checks the integrity of firmware and software during system startup based on digital fingerprints, so-called hash values, starting from a “Root of Trust” in the Trusted Platform Module (TPM). The comparison hashes are also located in the TPM, in so-called Platform Configuration Registers (PCRs). The process is similar to Secure Boot. However, Secure Boot aborts the boot process if hashes deviate, while Measured Boot logs the hashes of the components and their configuration and can send them encrypted to other systems for verification (Remote Attestation, detailed explanation by Infineon). A talk at “All Systems Go” last year also shows Poettering's thoughts on the security architecture in Linux."
"Remote Attestation"... by who?
This is basically an attack on Software Freedom, even if they toss around the brand "Linux". █
