- Bitfrost
Infobox_Software
name = Bitfrost
caption =
developer = Ivan Krstić
latest_release_version =
latest_release_date =
operating_system =Linux
genre =Privacy , Antivirus
license =GNU General Public License
website =Bitfrost is the security design specification for the
OLPC XO , a low cost laptop intended for children in developing countries and developed by theOne Laptop Per Child (OLPC) project. Bitfrost's main architect is Ivan Krstić [ [http://radian.org/notebook ivan krstić · code culture ] ] . The first public specification was made available in February 2007.Bitfrost architecture
Passwords
No
password s are required to access or use the computer.ystem of rights
Every program, when first installed, requests certain bundles of rights, for instance "accessing the camera", or "accessing the internet". The system keeps track of these rights, and the program is later executed in an environment which makes only the requested resources available. The implementation is not specified by Bitfrost, but dynamic creation of security contexts is required. The first implementation was based on
vserver , the second and current implementation is based on user IDs and group IDs (/etc/password is edited when an activity is started), and a future implementation might involveSE Linux or some other technology.By default, the system denies certain combinations of rights; for instance, a program would not be granted both the right to access the camera and to access the internet. Anybody can write and distribute programs that request allowable right combinations. Programs that require normally unapproved right combinations need a cryptographic signature by some authority. The laptop's user can use the built-in
security panel to grant additional rights to any application.Modifying the system
The users can modify the laptop's
operating system , a special version ofRed Hat Linux running the new Sugargraphical user interface and operating on top ofLinuxBIOS andOpen Firmware . The original system remains available in the background and can be restored.By acquiring a developer key from a central location, a user may even modify the background copy of the system and many aspects of the
BIOS . Such a developer key is only given out after a waiting period (so that theft of the machine can be reported in time) and is only valid for one particular machine.Theft-prevention leases
The laptops request a new "lease" from a central network server once a day. These leases come with an expiry time (typically a month), and the laptop stops functioning if all its leases have expired. Leases can also be given out from local school servers or via a portable
USB device. Laptops that have been registered as stolen cannot acquire a new lease.The deploying country decides whether this lease system is used and sets the lease expiry time.
Microphone and camera
The laptop's built-in
camera andmicrophone are hard-wired toLED s, so that the user always knows when they are operating. This cannot be switched off by software.Privacy concerns
Len Sassaman , a computer security researcher at theCatholic University of Leuven inBelgium and his colleague Meredith Patterson at theUniversity of Iowa inIowa City claim that the Bitfrost system has inadvertently become a possible tool for unscrupulous governments or government agencies to definitively trace the source of digital information and communications that originated on the laptops [ [http://technology.newscientist.com/channel/tech/mg19826596.100-laptops-could-betray-users-in-the-developing-world.html?feedId=online-news_rss20 New Scientist, 5 June 2008: "Laptops could betray users in the developing world"] ] . This is a potentially serious issue as many of the countries which have the laptops have governments with questionable human rights records.Notes
* The specification itself mentions that the name "Bitfrost" is a play on the
Norse mythology concept ofBifröst , the bridge between the world of mortals and the realm of gods. According to theProse Edda , the bridge was built to be strong, yet it will eventually be broken; the bridge is an early recognition of the idea that there's no such thing as a perfect security system.ee also
*
CapDesk
*HP Polaris (computer security) References
External links
* [http://radian.org/notebook/ Ivan Krstić's homepage]
*
* [http://dev.laptop.org/git?p=security;a=blob;f=bitfrost.txt Bitfrost specification] , version Draft-19 - release 1, 7 February 2007
* [http://www.wired.com/news/technology/0,72669-0.html?tw=wn_index_1 High Security for $100 Laptop] , Wired News, 7 February 2007
* [http://www.technologyreview.com/tr35/Profile.aspx?Cand=T&TRID=613 Making antivirus software obsolete] - Technology Review magazine recognized Ivan Krstić, Bitfrost's main architect, as one of the world's top innovators under the age of 35 (Krstić was 21 at the time of publication) for his work on the system.
Wikimedia Foundation. 2010.