What's new

Indigenous OS for computers from DRDO soon

Well guys , This GOI invited BIG players like NIIT, HCL, Infosis , TCS , Satyam and from the Committee to build secured OS, The idea was since MS OS can carry code which can provide back door entry to US and other countries.

Thats why all Indian System carrying Sensitive Data as not connected to net all all.

India was its own OS with source code for Military, DRDO, ISRO, Defence Firms etc so that it can become hacker proof , since no one will know the architecture of the OS, therefore no one can tamper it.

At the same time, BOSS is developed by C-DAC for Indian Govt entities, like State Govt depts , Central dept (Non strategic). The Idea is to shift the entire govt on Linux after 15-20 years.

why after 15-20 Years? well right now , it difficult to teach present babu linux as they dont know much about MS also. So all state govt slowing migrating towards linux and making them at par of MS in teaching.

After15-20 years when young generation is familiar with Linux, Govt dept will shift into BOSS.

however MS doing it best to prevent all this from happening, Providing Free OS/ Desktop/ Lobby with H/w players etc to stop moving toward linux.
 
Why do we need a new OS? Linux more than suffices for all our purposes. Just have some experts put in the security mechanisms. If they indeed go with a indigenous OS, we may never know its vulnerabilities while the enemies surely will and they will have unrestricted access once vulnerabilities are known.
Even if we assume they use a tight while loop, The major issue is going to be the networking/communication. Are they going to create another TCP/IP? If so they are going to be screwed developing a decent one. If not, they are still open to the same vulnerabilities the existing systems are open to.
 
Why do we need a new OS? Linux more than suffices for all our purposes. Just have some experts put in the security mechanisms. If they indeed go with a indigenous OS, we may never know its vulnerabilities while the enemies surely will and they will have unrestricted access once vulnerabilities are known.
Even if we assume they use a tight while loop, The major issue is going to be the networking/communication. Are they going to create another TCP/IP? If so they are going to be screwed developing a decent one. If not, they are still open to the same vulnerabilities the existing systems are open to.

In all probability the new OS kernel might be based on Linux.......but should have proprietary protocols for communication between two systems. If the protocols are not know then its very very difficult to build viruses that can affect it and breach security by hacking into the system.

Its not that difficult to create another TCP/IP like protocol. The company I work for have already developed a propitiatory protocol and is in use with Indian defence for the last 5 years.
 
In all probability the new OS kernel might be based on Linux.......but should have proprietary protocols for communication between two systems. If the protocols are not know then its very very difficult to build viruses that can affect it and breach security by hacking into the system.

Its not that difficult to create another TCP/IP like protocol. The company I work for have already developed a propitiatory protocol and is in use with Indian defence for the last 5 years.

That's a dangerous assumption. Communication security should not depend on the other party not knowing the protocol. We should assume that they will get to know. Security should be built over it in terms of IPSEC.
I'd be interested in knowing how this protocol you talk about works. Is there any information I can lookup in public domain?
 
Back
Top Bottom