- [CLIP OS kernel configuration][2],
- last public [grsecurity][3] patch (options which they disable).
-Please don't cry if my Python code looks like C. I'm just a kernel developer.
+I also created [__Linux Kernel Defence Map__][4] that is a graphical representation of the
+relationships between these hardening features and the corresponding vulnerability classes
+or exploitation techniques.
## Supported microarchitectures
The version format is: __[major_number].[kernel_version]__
-The current version of `kconfig-hardened-check` is __0.5.2__, it's marked with the git tag.
+The current version of `kconfig-hardened-check` is __0.5.3__, it's marked with the git tag.
## Questions and answers
[1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
[2]: https://docs.clip-os.org/clipos/kernel.html#configuration
[3]: https://grsecurity.net/
+[4]: https://github.com/a13xp0p0v/linux-kernel-defence-map