C3Subtitles: 36c3: A systematic evaluation of OpenBSD's mitigations
back

A systematic evaluation of OpenBSD's mitigations

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:53:01
Language
English
Abstract
OpenBSD markets itself as a secure operating system, but doesn't provide much evidences to back this claim. The goal of this talk is to evaluate how effective OpenBSD's security mitigation are, in a systematic, rational and comprehensive way.

<a href="https://openbsd.org">OpenBSD's website</a> advertises a secure and modern operating system, with cool and modern mitigations. But no rational analysis is provided: are those mitigations effective? what are their impacts on performances, inspectability and complexity? against what are they supposed to defend? how easy are they to bypass? where they invented by OpenBSD or by others? is OpenBSD's reputation warranted?

This talk aims at answering all those questions, for all OpenBSD's mitigations, because, in the words of <a href="https://twitter.com/ryiron/status/1150924668020203521">Ryan Mallon</a>:

<quote>Threat modelling rule of thumb: if you don’t explain exactly what you are securing against and how you secure against it, the answers can be assumed to be: “bears” and “not very well”.</quote>

All the research done for this talk is available on <a href="https://isopenbsdsecu.re">isopenbsdsecu.re</a>

Talk ID
10519
Event:
36c3
Day
3
Room
Clarke
Start
11:30 a.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
stein
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%

English: Transcribed until

Last revision: 11 months, 1 week ago