
Sign up to save your podcasts
Or


Mirror of the Youtube video
00:00 Introduction
Is Linux truly secure, or are we clinging to a myth born in the β70s?
We expose how the very tools meant to protect β from iptables to LSM β are often too complex, too fragile, and architecturally outdated. It's not just about misconfigurations: it's about flawed design choices baked into the system. Security in Linux isn't automatic β it demands deep expertise. And that makes it inaccessible and unsafe for most.
We back this up with real academic research, measurable performance limitations, and cutting-edge alternatives like formal verification, eBPF, declarative policies, and Zero Trust architectures.
This is not a rant β itβs a call for awareness.
Cornell CS6410 β seL4 Verified Microkernel (2024)
Analysis of Linux OS Security Tools for Packet Filtering and Processing
Linux Security Module Framework (2019)
A Quantitative Study of Firewall Configuration Errors (Avishai Wool, 2004)
X-Trace: Performance Analysis and Diagnosis (USENIX ATC 2012)
Cloudflare Blog β Kernel Bypass and DPDK
IETF Draft β IPv6 Transition Scalability
Performance Testing of Linux Firewalls
Brendan Gregg β Linux BPF Superpowers (2016)
Nelson et al. β Margrave: Policy Analysis Framework (USENIX LISA 2010)
NIST SP 800-207 β Zero Trust Architecture (2020)
Intent-Based Networking with Dialog-based Policy Learning (SIGCOMM CCR 2019)
Kinetic: Verifiable Dynamic Network Control (USENIX NSDI 2015)
Butler Lampson β "Protection" (1974)
Tina Wong β On the Usability of Firewall Configuration (2008)
By Mirror of the Youtube video
00:00 Introduction
Is Linux truly secure, or are we clinging to a myth born in the β70s?
We expose how the very tools meant to protect β from iptables to LSM β are often too complex, too fragile, and architecturally outdated. It's not just about misconfigurations: it's about flawed design choices baked into the system. Security in Linux isn't automatic β it demands deep expertise. And that makes it inaccessible and unsafe for most.
We back this up with real academic research, measurable performance limitations, and cutting-edge alternatives like formal verification, eBPF, declarative policies, and Zero Trust architectures.
This is not a rant β itβs a call for awareness.
Cornell CS6410 β seL4 Verified Microkernel (2024)
Analysis of Linux OS Security Tools for Packet Filtering and Processing
Linux Security Module Framework (2019)
A Quantitative Study of Firewall Configuration Errors (Avishai Wool, 2004)
X-Trace: Performance Analysis and Diagnosis (USENIX ATC 2012)
Cloudflare Blog β Kernel Bypass and DPDK
IETF Draft β IPv6 Transition Scalability
Performance Testing of Linux Firewalls
Brendan Gregg β Linux BPF Superpowers (2016)
Nelson et al. β Margrave: Policy Analysis Framework (USENIX LISA 2010)
NIST SP 800-207 β Zero Trust Architecture (2020)
Intent-Based Networking with Dialog-based Policy Learning (SIGCOMM CCR 2019)
Kinetic: Verifiable Dynamic Network Control (USENIX NSDI 2015)
Butler Lampson β "Protection" (1974)
Tina Wong β On the Usability of Firewall Configuration (2008)