From b19e3589fca2436a89dfe4a34c4c03df03ee5159 Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Sat, 15 Jul 2023 19:10:57 +0100 Subject: [PATCH] fact check, courtesy of AndrewYu on IRC Signed-off-by: Leah Rowe --- site/docs/linux/grub_hardening.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/site/docs/linux/grub_hardening.md b/site/docs/linux/grub_hardening.md index 5aed191..ac0279b 100644 --- a/site/docs/linux/grub_hardening.md +++ b/site/docs/linux/grub_hardening.md @@ -34,8 +34,8 @@ for coreboot file system and it is what we will focus on in this article). We will be using this functionality to verify the signature of a Linux kernel, at boot time. In conjunction with reproducible builds (both libreboot and your Linux kernel), this can greatly improve system security; Debian is an excellent -example of a Linux distribution that is fully reproducible nowadays (in -stable releases). +example of a project striving towards this goal; see: + For your reference: a reproducible build is one where, given a precise (and well documented) development setup, the exact same binary can be produced each