Skip to main content

From Sovereign Operating Systems to the Sovereign Digital Chain

  • Chapter
  • First Online:
  • 218 Accesses

Part of the book series: Philosophical Studies Series ((PSSP,volume 133))

Abstract

This chapter is a mostly non technical reflection on the concept of ‘Sovereign Operating System’ in the modern context of a globalized world. In a modern world, where software and data will potentially be driving anything in a near future, a nation sovereignty cannot be restricted to territory questions such as land, air, sea property and frontiers, or to general regulation of the national activity. It is either demonstrated or well admitted that many software pieces, including Operating System, include backdoors that can either be used to spy information on a system and send it to unauthorized parties, or be used by some unauthorized parties to take control of local or connected devices. Furthermore, nowadays, more and more third-party internet services (APIs) are integrated deeply in some modern OSes, and can be considered as fully part of them. Also some issues are suspected with networks and Internet, were massive amounts of data can be catched and analyzed illegally by hackers and countries, breaking confidentiality of information at corporate or government levels. Even computer hardware cannot be excluded from possible takeovers as there are some rising evidences that some modern CPUs include backdoors by design. Therefore, it appears clearly that the Operating System, even in its modern form, can not be considered alone regarding the digital sovereignty question, as all parts of the digital chain in data processing and transit has to be carefully examined and reinforced.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Russo-Georgian war: https://en.wikipedia.org/wiki/Russo-Georgian_War

  2. 2.

    About Stuxnet: https://en.wikipedia.org/wiki/Stuxnet

  3. 3.

    About National Security Agency https://en.wikipedia.org/wiki/National_Security_Agency

  4. 4.

    About PRISM survaillance program: https://en.wikipedia.org/wiki/PRISM_(surveillance_program)

  5. 5.

    About GPS https://en.wikipedia.org/wiki/Galileo_(satellite_navigation)

  6. 6.

    About Galileo positioning system: https://en.wikipedia.org/wiki/Galileo_(satellite_navigation)

  7. 7.

    Definition of an API: https://en.wikipedia.org/wiki/Application_programming_interface

  8. 8.

    OS kernel definition: https://en.wikipedia.org/wiki/Kernel_(operating_system)

  9. 9.

    About Linux: https://en.wikipedia.org/wiki/Linux

  10. 10.

    About macOS: https://en.wikipedia.org/wiki/MacOS

  11. 11.

    About iOS: https://en.wikipedia.org/wiki/IOS

  12. 12.

    About Windows: https://en.wikipedia.org/wiki/Microsoft_Windows

  13. 13.

    About Android: https://en.wikipedia.org/wiki/Android_(operating_system)

  14. 14.

    “Operating System New-Generation”, used to design new forms of Operating Systems that include not only the kernel but also Interned-wide services and APIs.

  15. 15.

    Read about Android backdoors to China servers at: http://securityaffairs.co/wordpress/53464/hacking/android-backdoor.html and http://securityaffairs.co/wordpress/53605/mobile-2/low-cost-android-devices-backdoor.html

  16. 16.

    Read about Apple sending user’s call history to iCloud: https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/

  17. 17.

    Read: https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data

  18. 18.

    Read https://en.wikipedia.org/wiki/RSA_Security#Relationship_with_NSA

  19. 19.

    Read https://en.wikipedia.org/wiki/Security-Enhanced_Linux

  20. 20.

    Read https://falkvinge.net/2013/11/17/nsa-asked-linus-torvalds-to-install-backdoors-into-gnulinux/

  21. 21.

    Read: https://www.theguardian.com/business/2015/apr/30/airbus-could-sue-following-allegations-germany-spied-on-them-for-the-us

  22. 22.

    About Red Flag: https://en.wikipedia.org/wiki/Red_Flag_Linux

  23. 23.

    About COS: https://en.wikipedia.org/wiki/COS_(operating_system)

  24. 24.

    About ROSA: https://en.wikipedia.org/wiki/ROSA_Linux

  25. 25.

    About Nova: https://en.wikipedia.org/wiki/Nova_(operating_system)

  26. 26.

    About Canaima: https://en.wikipedia.org/wiki/Canaima_(operating_system)

  27. 27.

    About Red Star OS: https://en.wikipedia.org/wiki/Red_Star_OS

  28. 28.

    About CLIP: http://www.numerama.com/tech/138683-los-souverain-made-in-france-existe-deja-decouvrez-clip.html

  29. 29.

    About ANSSI: http://www.ssi.gouv.fr/en/

  30. 30.

    About OIV: https://fr.wikipedia.org/wiki/Op%C3%A9rateur_d'importance_vitale

  31. 31.

    About “Institut pour la Souverainet´e Num´erique”: http://www.souverainetenumerique.fr/

  32. 32.

    About Intel processors backdoor “Intel x86s hide another CPU that can take over your machine (you can’t audit it)”: https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html

  33. 33.

    A technical and comprehensive study of Intel x86 plateform security and privacy “Intel x86 considered harmful”, by Joanna Rutkowska, october 2015: https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf

  34. 34.

    Read for instance about the EAL levels: https://en.wikipedia.org/wiki/Evaluation_Assurance_Level

  35. 35.

    About Qubes OS, ‘A reasonably secure operating system’: https://www.qubes-os.org/

  36. 36.

    Read about the potential of Quantum Computing for cryptanalysis: https://en.wikipedia.org/wiki/Cryptanalysis#Quantum_computing_applications_for_cryptanalysis

  37. 37.

    Read about German-wide routers attack: http://www.theregister.co.uk/2016/11/28/router_flaw_exploited_in_massive_attack/

  38. 38.

    ‘GAFAM’ is an acronym for “Google, Apple, Facebook, Amazon, Microsoft”.

Acknowledgements

Thanks to François Nemo for his lecture and his suggestions for the conclusion paragraph.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaël Duval .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Duval, G. (2018). From Sovereign Operating Systems to the Sovereign Digital Chain. In: De Mol, L., Primiero, G. (eds) Reflections on Programming Systems. Philosophical Studies Series, vol 133. Springer, Cham. https://doi.org/10.1007/978-3-319-97226-8_9

Download citation

Publish with us

Policies and ethics