Background: I have an embedded processor running a custom application on top of Linux. I control the kernel, the rootfs, and the application. I would like to deploy this application such that, if somebody were to gain access to my device, even root access, (s)he would not be able to read or copy the application from the device. I don't know how or if the kernel would even support such a situation -- if the executable is not readable, it should not be mappable, and therefore the kernel would have a hard time swapping in pages from it. So, I recognize that this may be an impossible request. But it feels like the sort of thing somebody else should have wondered about, and it feels like the sort of thing that SELinux might be able to handle. Any thoughts or recommendations? I asked on IRC, and one person (grist) suggested that perhaps I should encrypt the file. I could do that, but then I find myself in the situation of figuring out how to protect the encryption key on the device. I could implement a TEE (Trusted Execution Environment) on the device or attach a TPM (Trusted Platform Module) to protect the key, but those approaches add their own complexities. Any thoughts or pointers would be gratefully accepted. --wpd _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.