tuxedo-keyboard VS coreboot

Compare tuxedo-keyboard vs coreboot and see what are their differences.

tuxedo-keyboard

This repository will no longer get any updates as the code here is now part of tuxedo-drivers https://gitlab.com/tuxedocomputers/development/packages/tuxedo-drivers. (by tuxedocomputers)

coreboot

Read-only mirror of https://review.coreboot.org/coreboot.git. Synced every hour. We don't handle Pull Requests. (by coreboot)
InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
tuxedo-keyboard coreboot
33 94
304 2,337
- 2.0%
0.0 9.9
over 1 year ago 6 days ago
C C
GNU General Public License v3.0 only GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

tuxedo-keyboard

Posts with mentions or reviews of tuxedo-keyboard. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-12.

coreboot

Posts with mentions or reviews of coreboot. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-09-03.
  • Authenticated Boot and Disk Encryption on Linux
    2 projects | news.ycombinator.com | 3 Sep 2024
    > Show me a FLOSS implementation of this standard and you will have a point

    I've had a point from my first comment and it hasn't changed in validity. It's just taking time to convince you, but I think I'm making progress :)

    I referenced several open implementations in my last reply, an a cursory search reveals more [1] [2]. Besides, this still doesn't help you trust the hardware, even if that hardware is entirely open like some sort of RISC chip. Can you verify every step in the supply chain? At every stage of assembly? No? Or, assuming a trusted device, can you be 100% confident something wasn't added, a simple keylogger? Most keyboards can be removed from laptops without leaving a trace, so can screen casings, speakers, batteries, etc. Plenty of places to hide something tiny.

    > At the moment, I would have to trust a megacorporation obeying NSA,

    That's less likely than the software you use having been compromised, for example by introducing an obfuscated bug, or MitMing as you perform a software update (many software update mechanisms have notoriously weak security, search some defcon talks on the subject).

    > Your threat model may vary.

    No, what I'm saying applies to all threat models, and I challenge you to name one to disprove that.

    Secure boot is an open standard and can be implemented in a trustworthy and secure way, you just need to put in the work to do so. It's entirely possible to do so.

    Of course if you are putting in all that work, if you are that at risk, you would need to switch your software stack entirely as well and use something like seL4 as a starting point.

    [1] https://github.com/prplfoundation/prpl-secure-boot

    [2] https://www.coreboot.org/

  • No more boot loader: Please use the kernel instead
    10 projects | news.ycombinator.com | 8 Jul 2024
  • Chromebooks will get 10 years of automatic updates
    2 projects | news.ycombinator.com | 14 Sep 2023
    Why BIOS (did you mean UEFI?) when it runs the best boot loader, which is Coreboot¹. Many users would love to re-flash their bios/uefi for it, if it’s supported.

    1: https://www.coreboot.org/

  • C++ is everywhere, but noone really talks about it. What are people's thoughts?
    8 projects | /r/cscareerquestions | 8 Jul 2023
    Coreboot is 0.6% C++.
  • Laptops with best Linux support (latest gen, battery life, performance)?
    2 projects | /r/linuxhardware | 17 Jun 2023
    NovaCustom ; some models come with Dasharo a coreboot distribution.
  • Asus flip c302 last update
    1 project | /r/chromeos | 6 Jun 2023
    You can also use Mr. Chromebox Script to install Coreboot on your chromebook to get a UEFI BIOS on your Chromebook and then you can go an install either a linux distro or even Windows if you want. It's a pretty straightforward process and also reversable if you want to go back to just using ChromeOS.
  • A Linux laptop under 1350€
    1 project | /r/linuxhardware | 26 May 2023
    Some models are available with Dasharo a [coreboot]https://www.coreboot.org/) distribution.
  • why no haswell_ult_dmi_registers for broadwell? in https://github.com/coreboot/coreboot/blob/master/util/inteltool/pcie.c
    1 project | /r/coreboot | 24 May 2023
    why no haswell_ult_dmi_registers for broadwell? in https://github.com/coreboot/coreboot/blob/master/util/inteltool/pcie.c
  • Having issues restoring the firmware with u/MrChromebox's utility
    1 project | /r/chrultrabook | 7 May 2023
    use croshfirmware.sh from https://github.com/coreboot/coreboot/tree/master/util/chromeos
  • AMD to move to open source firmware in 2026
    5 projects | /r/hardware | 6 May 2023
    There may be other protections to restrict SPI flash access for security reasons (so you might not be able to flash your custom firmware in the OS), but worst case you can use a HW flasher (or maybe USB flashback). Still, this doesn't address the elephant in the room - platform initialization code might be open-sourced, but that isn't everything. You'll still need to figure out the board-specific stuff (the Super I/O chip, chipset GPIOs, other peripherals, etc.). Using coreboot as an example, Intel provides the Firmware Support Package blob to handle platform initialization. I think AGESA is somewhat similar to this, though Intel publicly releases the binaries for use in coreboot/etc. Thanks to the FSP, coreboot has support for recent Intel chipsets. However, there is only support for two recent consumer boards: the MSI PRO Z690-A WiFi DDR4 and DDR5.

What are some alternatives?

When comparing tuxedo-keyboard and coreboot you can also consider the following projects:

QMK-OpenRGB - Open-source keyboard firmware for Atmel AVR and Arm USB families

u-boot - "Das U-Boot" Source Tree

avell-unofficial-control-center - This is a Unofficial Control Center for Avell Laptops with Linux System

edk2 - EDK II

tuxedo-control-center - A tool to help you control performance, energy, fan and comfort settings on TUXEDO laptops.

UEFITool - UEFI firmware image viewer and editor

InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured

Did you know that C is
the 6th most popular programming language
based on number of references?