Last Saturday, I was honored and delighted to give the keynote at Grazer Linuxtage #GLT26, a large #Linux event with a lot of history (23 years and counting!) and still a dedicated team behind it.
Title: "What can we learn from Android for other embedded Linux systems security?"
Slides are available at https://pretalx.linuxtage.at/glt26/talk/J8GCHE/, talk recording at https://media.ccc.de/v/glt26-615-what-can-we-learn-from-android-for-other-embedded-linux-systems-security
What can we learn from Android for other embedded Linux systems security? Grazer Linuxtage 2026
Android has become the primary operating system for a significant part of the global population, and it uses Linux at its core. While the user space stack on top of the kernel is vastly different from the usual desktop distributions, lessons learnt in Android platform development are valuable to other (embedded) Linux systems. In particular, Android has pioneered the scaled deployment of a number of security measures, from application level sandboxing and permissions to fine-grained SELinux policies and dm-verity for system partition integrity. However, the most difficult challenge seems protecting against insider attacks, potentially with access to private signing keys. These mitigations can be used for other embedded Linux systems as well, and this talk should be seen as a call to action to try and adopt some of them more broadly in the embedded Linux ecosystem.
🇺🇦