@landley I'll propably have to gut functions out of toybox to get it where I want it to be, but then again the "#CORE" Version of OS/1337 will be very much barebones....
Just the essentials to get #Dropbear#Client to be able to #SSH into stuff, be able to make a #ramdisk and #wget / tiny-#curl everything else (i.e. a system image one could dd onto a HDD/SSD)...
@kurth granted I do prefer #Live-#Linux - Systems that avoid writes as much as possible and I do intent do enable OS/1337 to support a "boot from RAM" mode where it's copied as #Ramdisk and then started...
Because I do like that feature from @bunsenlabs / #BunsenLabs Linux and #PorteusKiosk as it provides a fast-feeling system whilst also yeeting all data afterwards.
Pretty shure @tails_live still wipes RAM manually at shutdown...
Thought: Is an SOC more secure than using descents components?
In the sense that: It’s possible to freeze the RAM chips of a running system to later extract the disk encryption key from it. I’m assuming this doesn’t work on SOCs?
Yes in that it'll require people to desolder stuff first.
No in that it's benefit is negigible considering that this attack vector will only apply to state-sponsored attackers and console hacking, so if someone has physical access to the PCB you're already f**ked.