Taming Yocto: Cybersecurity ??
Everything with internet access is vulnerable to cyber attacks.
Yocto is not an exception. How to make it more safe and robust?
Spoiler: it involves non-root users, sudo configuration & disabling root.
Let Esa help you ??
This ain't his first rodeo ??
Esa has been tinkering with Yocto for years.
Lucky for us, he has also been blogging his discoveries.
Get started here:
Yocto on WSL2, part 1
Yocto with Apple Silicon
Do you want to be in the same room with Esa? Apply here:
Sulautettujen j?rjestelmien kehitt?j?
Test automation engineer
Staff Software Engineer at Qt Group
1 年No offense, but if you're using Yocto on WSL2, you're doing it wrong. Real developers use Yocto on bare-metal Linux ??.