Originally reported by Sam Bent
TL;DR
A Canonical developer has been systematically removing GRUB features while developing a replacement over 10 years. Meanwhile, I2P's 12-hop routing architecture explains its performance issues, and Tails 7.6 adds domain fronting to hide Tor bridge requests from censors.
While these stories reveal interesting technical developments in privacy and underground infrastructure, they represent incremental improvements and analyses rather than immediate security threats or vulnerabilities.
Sam Bent reports that Julian Klode, a Canonical engineer, has been systematically removing features from GRUB bootloader since 2021 while simultaneously developing a replacement solution over the past decade. The analysis suggests this represents a coordinated effort to transition away from the current GRUB architecture, though the full scope and timeline of the replacement strategy remain unclear.
The systematic feature removal pattern indicates a deliberate deprecation strategy rather than standard maintenance, potentially affecting organizations relying on specific GRUB functionality for secure boot processes or custom deployment scenarios.
Technical analysis reveals why I2P (Invisible Internet Project) sites experience significant latency compared to clearnet alternatives. According to Bent's research, every I2P packet requires 12 network hops to complete a round trip, creating substantial overhead before any application-layer processing begins.
The performance issues compound when I2P's streaming library attempts to emulate TCP behavior on top of this high-latency foundation. This architectural constraint represents a fundamental trade-off between anonymity strength and network performance in the I2P ecosystem.
Tails 7.6 introduces domain fronting capabilities to obscure Tor bridge requests from network censors. The technique routes bridge acquisition traffic through content delivery network endpoints, making the requests appear as routine CDN traffic to surveillance systems.
Additional changes include replacing KeePassXC with GNOME Secrets to improve accessibility compliance and updating Electrum to catch up with 18 months of missed releases. The domain fronting implementation specifically targets jurisdictions where Tor bridge discovery represents a significant operational security risk for users.
Originally reported by Sam Bent