Probably not? I could think of ways to hide the controls but the most likely targets would be Linux forks and firmware that run in cell phones, cars, appliances, IoT's, etc... Those are more likely to be in the path of monitoring something interesting. Even in the case of cell phones, cars, etc, I would expect the control to be in firmware that one could tickle with JTAG over bluetooth, USB, WiFi, LoRa to take full control of the OS and bypass all security controls rendering encryption into a placebo or a CPU warmer. Why waste processing cycles on brute forcing when you can tell the application that the encryption key was successfully decrypted without ever even looking at the key.
I guess a simpler way to say that is, why control Linux when there are always so many proprietary things are in the path that only have a handful of people controlling them, especially when one could replace said people whereas replacing all the Linux developers would be hard. Firmware that provides a CPU ring -4 shell can bypass absolutely every security control anyone could imagine in microseconds.
Is Linux under the control of the USA gov?
Probably not? I could think of ways to hide the controls but the most likely targets would be Linux forks and firmware that run in cell phones, cars, appliances, IoT's, etc... Those are more likely to be in the path of monitoring something interesting. Even in the case of cell phones, cars, etc, I would expect the control to be in firmware that one could tickle with JTAG over bluetooth, USB, WiFi, LoRa to take full control of the OS and bypass all security controls rendering encryption into a placebo or a CPU warmer. Why waste processing cycles on brute forcing when you can tell the application that the encryption key was successfully decrypted without ever even looking at the key.
I guess a simpler way to say that is, why control Linux when there are always so many proprietary things are in the path that only have a handful of people controlling them, especially when one could replace said people whereas replacing all the Linux developers would be hard. Firmware that provides a CPU ring -4 shell can bypass absolutely every security control anyone could imagine in microseconds.
Like every title ending in a question mark, the answer is no.
Officially it is opensource so answer should be "no".
But ... what if you shutdown access to all Linux kernel-related sites and repos?
They could be as effective as the old cryptography export controls, a pop up appears asking you not to download things to an illegal country.
Didn’t the linux kernel ban some russian folks over what’s being done in ukraine by the russian nation (ie Putin)?
In a way yes, Linux is under the control of the is government… via a bunch of indirection layers.
No?: https://www.phoronix.com/news/Linux-Compliance-Requirements
Are the russian folks continuing to develop the kernel? Their own version ? ( Would seem to be a natural outcome of a ban ...)
EU sanctioned Russia too. Not just the US.
[flagged]