Taming Yocto: Cybersecurity ??

Taming Yocto: Cybersecurity ??

Everything with internet access is vulnerable to cyber attacks.

Yocto is not an exception. How to make it more safe and robust?

Spoiler: it involves non-root users, sudo configuration & disabling root.

Let Esa help you ??

https://buutticonsulting.com/blogi/2024/01/10/yocto-hardening-non-root-users-sudo-configuration-disabling-root/


This ain't his first rodeo ??

Esa has been tinkering with Yocto for years.

Lucky for us, he has also been blogging his discoveries.

Get started here:

Yocto on WSL2, part 1

https://buutticonsulting.com/blogi/2022/05/19/yocto-on-wsl2-easier-than-you-think/

Yocto with Apple Silicon

https://buutticonsulting.com/blogi/2023/03/23/how-to-build-yocto-with-apple-silicon/


Do you want to be in the same room with Esa? Apply here:

Sulautettujen j?rjestelmien kehitt?j?

https://buutticonsulting.com/hae/?gh_jid=4007382101

Test automation engineer

https://codematch.buutti.com/tyopaikat/hae/?gh_jid=4102051101


Janne Juntunen

Staff Software Engineer at Qt Group

1 年

No offense, but if you're using Yocto on WSL2, you're doing it wrong. Real developers use Yocto on bare-metal Linux ??.

要查看或添加评论,请登录

Buutti的更多文章

社区洞察

其他会员也浏览了