Lennart Poettering, Christian Brauner founded a new company

What Amutable Appears To Be Building

  • Company describes goal as “cryptographically verifiable integrity” for Linux: systems boot into a verified state and remain trusted (secure boot + TPM + immutable images + attestation).
  • Likely built around existing systemd work: UKIs (unified kernel images), image-based/immutable OS layouts, dm-verity, TPM‑bound disk encryption, secure boot integration.
  • Representatives confirm: Linux-based OS, focus on attestation of immutable systems; details and revenue model intentionally vague for now.

Enthusiasm and Positive Use Cases

  • Strong support from some who see Linux boot security as badly behind ChromeOS/Windows/macOS and want:
    • Authenticated boot + TPM-backed FDE against evil‑maid and persistent malware.
    • Server/cloud attestation: verifying that rented or remote machines run exactly the audited image (Mullvad-style “transparent servers”, confidential computing).
    • Safety‑critical or industrial devices where owners explicitly want to prevent arbitrary code for life-safety reasons.
  • Some hope this could provide a FOSS attestation stack that breaks current mobile duopolies, or improve Linux’s standing for enterprise workloads.

Major Fears: DRM, Lockdown, and “War on General-Purpose Computing”

  • Large portion of thread sees remote attestation as “literally DRM” and part of a long-running “war on general-purpose computing.”
  • Concrete worries:
    • Banks, streaming, games, or ISPs eventually refusing service to “unattested” or user-modified systems (parallels with Android SafetyNet/Play Integrity, iOS, streaming DRM).
    • Laptop/PC vendors shipping hardware where users can’t enroll their own keys or disable secure boot, making unsigned or alternative OSes (including BSDs) second-class.
    • Governments or industry lobbying to outlaw user-controlled keys once the technical friction is gone.
  • Some view this as plugging the “user freedom hole”: making it hard to leave controlled ecosystems or run self-built kernels.

Debate: Neutral Mechanism vs Inherently Restrictive

  • One camp: remote attestation, trusted boot, TPM, etc. are neutral tools; DRM is policy layered on top. Same mechanisms can:
    • Help users verify their own machines and servers.
    • Improve cloud privacy (e.g., “private compute” models).
  • Other camp: in practice these tools overwhelmingly end up serving corporate/government control, not end users; citing:
    • Mobile platforms, Widevine/HDCP, printer DRM, vendor-keyed secure boot, banking apps blocking rooted/custom ROM devices.
    • Once built, such mechanisms cannot be “unbuilt” and will be reused in the most oppressive ways incentives allow.

systemd, Track Record, and Governance Trust

  • Heated revisiting of systemd’s history: some praise it as vastly better than SysV/Upstart (dependencies, security options, timers, logging); others catalog years of regressions, breakage, opaque behavior, and “arrogant” responses to bug reports.
  • Specific fear that new attestation features will follow the “systemd pattern”: start optional, become tightly coupled, then de-facto mandatory via distro decisions.
  • systemd maintainers in thread insist:
    • Disruptive features are intended to be opt-in.
    • Attestation features won’t be enforced by systemd itself; distros decide.
  • Skeptics counter that maintainers define what’s “disruptive” and past experience shows dissenters effectively told to “live with it.”

Threat Models, Privacy, and Technical Nuances

  • Supporters emphasize:
    • Current Linux secure boot use is weak: often only kernel is verified; initrd/userspace can still be replaced.
    • A strong chain (firmware → bootloader/UKI → dm-verity rootfs) plus TPM-bound secrets can detect or prevent persistence.
  • Critics question:
    • Realistic benefit for typical users vs. dominant risks from network-facing software.
    • Privacy impact of attestation keys (EK/AIK), potential cross-service tracking, and linkage to purchase records.
  • Some argue reproducible builds and transparency logs are essential complements; others note attestation can still be useful without them, depending on trust assumptions.

Business Model, Control, and Long-Term Risks

  • Company answers on revenue are generic (“robust path to revenue”); observers infer enterprise/server focus and possibly appliance/embedded deals (Tivo-style locked products).
  • Founding engineers repeatedly say:
    • User-controlled keys are central to their designs.
    • They won’t build systems to enforce vendor lockout.
    • Work will remain open source.
  • Many remain unconvinced, citing:
    • Historical shifts of projects once money, regulation, or acquisition enter (HashiCorp, WhatsApp, mobile OSes, etc.).
    • Risk that, even if initial intentions are good, later owners or partners (including large cloud or OS vendors) can repurpose the mechanisms against user freedom.