grsecurity, PaX, and RAP are essential defenses implemented in Subgraph OS. This is an important mitigation against contemporary exploitaion techniques and greatly increases the resistance of the kernel to modern exploits that can be used to escalate privileges once an application on the endpoint is breached. The Subgraph OS kernel is also built with the recently released RAP (demo from the test patch) security enhancements designed to prevent code-reuse (i.e. In addition to making the kernel more resistant to attacks, grsecurity and PaX security features offer strong security protection to all processes running without modification (i.e. Subgraph OS includes a kernel hardened with the well-respected grsecurity/PaX patchset for system-wide exploit and privilege escalation mitigation. Hardened kernel built with grsecurity, PaX, and RAP This is accomplished through system hardening and proactive, ongoing research on defensible system design. Subgraph OS is designed to be difficult to attack. Subgraph OS was designed to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks. Subgraph OS includes strong system-wide attack mitigations that protect all applications as well as the core operating system, and key applications are run in sandbox environments to reduce the impact of any attacks against applications that are successful. ![]() ![]() Even in alpha, Subgraph OS looks and feels like a modern desktop operating system. ![]() ![]() It is also meant to be familiar and easy to use. Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borneĮxploit and malware attacks. Subgraph OS: Adversary resistant computing platform
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |