Jump to content

Bitfrost: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
m cat, links
Line 13: Line 13:
}}
}}


'''Bitfrost''' is the security platform for the [[Children's Machine]], a low cost laptop intended for children in developing countries and developed by the One Laptop Per Child (OLPC) project. Bitfrost's main architect is Ivan Krstić. The first public specification was made available in February 2007.
'''Bitfrost''' is the security platform for the [[OLPC XO]], a low cost laptop intended for children in developing countries and developed by the [[One Laptop Per Child]] (OLPC) project. Bitfrost's main architect is Ivan Krstić. The first public specification was made available in February 2007.


==Bitfrost architecture==
==Bitfrost architecture==
Line 48: Line 48:
[[Category:Cryptographic software]]
[[Category:Cryptographic software]]
[[Category:Antivirus software]]
[[Category:Antivirus software]]
[[Category:OLPC]]


[[fr: Bitfrost]]
[[fr: Bitfrost]]

Revision as of 10:38, 1 September 2007

Bitfrost
Developer(s)Ivan Krstić
Operating systemLinux
TypePrivacy, Antivirus
LicenseGNU General Public License
Websitewiki.laptop.org/Bitfrost

Bitfrost is the security platform for the OLPC XO, a low cost laptop intended for children in developing countries and developed by the One Laptop Per Child (OLPC) project. Bitfrost's main architect is Ivan Krstić. The first public specification was made available in February 2007.

Bitfrost architecture

Passwords

No passwords are required to access or use the computer.

System of rights

Every program, when first installed, requests certain bundles of rights, for instance "accessing the camera", or "accessing the internet". The system keeps track of these rights, and the program is later executed in an environment which makes only the requested resources available. This is implemented by a fully-fledged, container-based virtual machine.

By default, the system denies certain combinations of rights; for instance, a program would not be granted both the right to access the camera and to access the internet. Anybody can write and distribute programs that request allowable right combinations. Programs that require normally unapproved right combinations need a cryptographic signature by some authority. The laptop's user can use the built-in security panel to grant additional rights to any application.

Modifying the system

The users can modify the laptop's operating system, a special version of Red Hat Linux running the new Sugar graphical user interface and operating on top of LinuxBIOS and Open Firmware. The original system remains available in the background and can be restored.

By acquiring a developer key from a central location, a user may even modify the background copy of the system and many aspects of the BIOS. Such a developer key is only given out after a waiting period (so that theft of the machine can be reported in time) and is only valid for one particular machine.

Theft-prevention leases

The laptops request a new "lease" from a central network server once a day. These leases come with an expiry time (typically a month), and the laptop stops functioning if all its leases have expired. Leases can also be given out from local school servers or via a portable USB device. Laptops that have been registered as stolen cannot acquire a new lease.

The deploying country decides whether this lease system is used and sets the lease expiry time.

Microphone and camera

The laptop's built-in camera and microphone are hard-wired to an LED, so that the user always knows when they are operating. This cannot be switched off by software.

Trivia

  • The specification itself mentions that the name "Bitfrost" is a play on the Norse mythology concept of Bifröst, the bridge between the world of mortals and the realm of gods. According to the Prose Edda, the bridge was built to be strong, yet it will eventually be broken; the bridge is an early recognition of the idea that there's no such thing as a perfect security system.

Also See