As the 6 largest internet firms in the business team up to fight the good fight against government surveillance, today the developers behind FreeBSD announced they would be tightening up security on their notoriously secure operating system, in an effort to rebuff the efforts of federal agencies to gain access to their users personal information.
The developer claims their primary mission and concern has always been the safety of their architecture both online and off-network, enabling their small but devoted following the capability to control nearly every aspect of their experience from the baseboard all the way up to frontend programming of the OS itself.
“For [FreeBSD] 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random. It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more”, the post states.
They’ve removed the dependency on Random Number Generators (RNGs) to calculate encryption keys and install security measures, and told the press at the FreeBSD Developer Summit in Malta they would consider new options as a part of their plan to move forward for future releases.
One solution on offer from Polish contributor Pawel Jakub Dawidek, the post states, is to use the time it takes to attach devices at boot time, and feed these numbers into /dev/random: “it turns out that one can get about 4 good bits of entropy from each device”.
Although there aren’t currently any VPN providers who offer a one-click solution for FreeBSD, you can always follow our easy to use guide that shows you exactly how to configure your wireless router with HideMyAss Pro VPN in a pinch. This means all your connections in and out of the house, whether on FreeBSD or otherwise, will stay secure and hidden from the threat in Washington.