Abstract
This chapter is a mostly non technical reflection on the concept of ‘Sovereign Operating System’ in the modern context of a globalized world. In a modern world, where software and data will potentially be driving anything in a near future, a nation sovereignty cannot be restricted to territory questions such as land, air, sea property and frontiers, or to general regulation of the national activity. It is either demonstrated or well admitted that many software pieces, including Operating System, include backdoors that can either be used to spy information on a system and send it to unauthorized parties, or be used by some unauthorized parties to take control of local or connected devices. Furthermore, nowadays, more and more third-party internet services (APIs) are integrated deeply in some modern OSes, and can be considered as fully part of them. Also some issues are suspected with networks and Internet, were massive amounts of data can be catched and analyzed illegally by hackers and countries, breaking confidentiality of information at corporate or government levels. Even computer hardware cannot be excluded from possible takeovers as there are some rising evidences that some modern CPUs include backdoors by design. Therefore, it appears clearly that the Operating System, even in its modern form, can not be considered alone regarding the digital sovereignty question, as all parts of the digital chain in data processing and transit has to be carefully examined and reinforced.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Russo-Georgian war: https://en.wikipedia.org/wiki/Russo-Georgian_War
- 2.
About Stuxnet: https://en.wikipedia.org/wiki/Stuxnet
- 3.
About National Security Agency https://en.wikipedia.org/wiki/National_Security_Agency
- 4.
About PRISM survaillance program: https://en.wikipedia.org/wiki/PRISM_(surveillance_program)
- 5.
- 6.
About Galileo positioning system: https://en.wikipedia.org/wiki/Galileo_(satellite_navigation)
- 7.
Definition of an API: https://en.wikipedia.org/wiki/Application_programming_interface
- 8.
OS kernel definition: https://en.wikipedia.org/wiki/Kernel_(operating_system)
- 9.
About Linux: https://en.wikipedia.org/wiki/Linux
- 10.
About macOS: https://en.wikipedia.org/wiki/MacOS
- 11.
About iOS: https://en.wikipedia.org/wiki/IOS
- 12.
About Windows: https://en.wikipedia.org/wiki/Microsoft_Windows
- 13.
About Android: https://en.wikipedia.org/wiki/Android_(operating_system)
- 14.
“Operating System New-Generation”, used to design new forms of Operating Systems that include not only the kernel but also Interned-wide services and APIs.
- 15.
Read about Android backdoors to China servers at: http://securityaffairs.co/wordpress/53464/hacking/android-backdoor.html and http://securityaffairs.co/wordpress/53605/mobile-2/low-cost-android-devices-backdoor.html
- 16.
Read about Apple sending user’s call history to iCloud: https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
About Red Flag: https://en.wikipedia.org/wiki/Red_Flag_Linux
- 23.
- 24.
About ROSA: https://en.wikipedia.org/wiki/ROSA_Linux
- 25.
- 26.
About Canaima: https://en.wikipedia.org/wiki/Canaima_(operating_system)
- 27.
About Red Star OS: https://en.wikipedia.org/wiki/Red_Star_OS
- 28.
- 29.
About ANSSI: http://www.ssi.gouv.fr/en/
- 30.
- 31.
About “Institut pour la Souverainet´e Num´erique”: http://www.souverainetenumerique.fr/
- 32.
About Intel processors backdoor “Intel x86s hide another CPU that can take over your machine (you can’t audit it)”: https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
- 33.
A technical and comprehensive study of Intel x86 plateform security and privacy “Intel x86 considered harmful”, by Joanna Rutkowska, october 2015: https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
- 34.
Read for instance about the EAL levels: https://en.wikipedia.org/wiki/Evaluation_Assurance_Level
- 35.
About Qubes OS, ‘A reasonably secure operating system’: https://www.qubes-os.org/
- 36.
Read about the potential of Quantum Computing for cryptanalysis: https://en.wikipedia.org/wiki/Cryptanalysis#Quantum_computing_applications_for_cryptanalysis
- 37.
Read about German-wide routers attack: http://www.theregister.co.uk/2016/11/28/router_flaw_exploited_in_massive_attack/
- 38.
‘GAFAM’ is an acronym for “Google, Apple, Facebook, Amazon, Microsoft”.
Acknowledgements
Thanks to François Nemo for his lecture and his suggestions for the conclusion paragraph.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Duval, G. (2018). From Sovereign Operating Systems to the Sovereign Digital Chain. In: De Mol, L., Primiero, G. (eds) Reflections on Programming Systems. Philosophical Studies Series, vol 133. Springer, Cham. https://doi.org/10.1007/978-3-319-97226-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-97226-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97225-1
Online ISBN: 978-3-319-97226-8
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)