Skip to content

Commit 7074be6

Browse files
feat: add FAQ item that points to the build architecture (#320)
1 parent 35300d4 commit 7074be6

1 file changed

Lines changed: 6 additions & 0 deletions

File tree

content/FAQ.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ permalink: /faq
1313
- [Project information](#project)
1414
- [Why secureblue?](#why-secureblue)
1515
- [Is secureblue immutable?](#immutable)
16+
- [Why trust secureblue?](#why-trust-secureblue)
1617
- [What are the official secureblue communication channels?](#comms)
1718
- [What is the difference between Qubes OS and secureblue?](#qubes)
1819
- [Why not upstream your changes?](#upstream)
@@ -94,6 +95,11 @@ secureblue is a collaborative effort to ship a maximally secure Linux operating
9495

9596
"Immutable" is an old misnomer for atomic systems. It gives the impression that users can't modify or tinker with their system, which is not the case. While directories like `/usr` are mounted read-only by default, settings and configurations can be easily overriden with changes in `/etc`, which is not mounted read-only. This is in addition to the fact that `/usr` is mutated with every deployment that is staged and booted via any `rpm-ostree` operation (like upgrading, installing a new package, etc). As such, secureblue is not immutable.
9697

98+
### [Why trust secureblue?](#why-trust-secureblue)
99+
{: #why-trust-secureblue}
100+
101+
secureblue uses several complementary mechanisms to protect against a variety of supply chain attack vectors, including vectors like rogue maintainers and theft of maintainer signing keys. For more information on these mechanisms, see the Build Architecture [article](/articles/build-architecture).
102+
97103
### [What are the official secureblue communication channels?](#comms)
98104
{: #comms}
99105

0 commit comments

Comments
 (0)