X-Git-Url: http://git.nikiroo.be/?p=gofetch.git;a=blobdiff_plain;f=test%2Fexpected%2FLWN%2F0000763729.header.html;fp=test%2Fexpected%2FLWN%2F0000763729.header.html;h=6988e8a200c940939afcb49790ad69d6d8fabd72;hp=9db006bddaa56d59d287900497c3979215f137b6;hb=e818d449fee8a5397ab2f05df63bbeffc4c67dc0;hpb=a6a7ff9f2e7f42f17eaa69be2bfad201195b3eb4 diff --git a/test/expected/LWN/0000763729.header.html b/test/expected/LWN/0000763729.header.html index 9db006b..6988e8a 100644 --- a/test/expected/LWN/0000763729.header.html +++ b/test/expected/LWN/0000763729.header.html @@ -13,7 +13,7 @@
([Kernel] Aug 30, 2018 18:50 UTC (Thu) (corbet))

- The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the fs-verity mechanism is being proposed as a way to protect individual files from malicious modification. + The developers of the Android system have, among their many goals, the wish to better protect Android devices against persistent compromise. It is bad if a device is taken over by an attacker; it's worse if it remains compromised even after a reboot. Numerous mechanisms for ensuring the integrity of installed system files have been proposed and implemented over the years. But it seems there is always room for one more; to fill that space, the [1]fs-verity mechanism is being proposed as a way to protect individual files from malicious modification.



[1] https://lwn.net/ml/linux-fsdevel/20180824161642.1144-1-ebiggers@kernel.org/