--- /dev/null
+<!DOCTYPE html>
+<html>
+<head>
+ <meta http-equiv='content-type' content='text/html; charset=utf-8'>
+ <meta name='viewport' content='width=device-width, initial-scale=1.0'>
+ <style type='text/css'>
+ body { margin: 1em 15%; }
+ </style>
+</head>
+<body>
+<div class='story-header'>
+ <h1><a href='0000763729.html'>[$] Protecting files with fs-verity</a></h1>
+ <div class='details'>([Kernel] Aug 30, 2018 18:50 UTC (Thu) (corbet))</div>
+ <br/>
+ <div class='content' style='text-align: justify'>
+ The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the fs-verity mechanism is being proposed as a way to protect individual files from malicious modification.
+ </div>
+<hr/>
+</div>
+</body>