[$] Theoretical vs. practical cryptography in the kernel
Shortly before the release of the 5.8 kernel, a brief patch to apseudo-random-number generator (PRNG) used by the networking stack was quietlyapplied to the kernel. As is the norm for such things, the changelog gaveno indication that a security vulnerability had been fixed, but that turnsout indeed to be the case. The resulting controversy had little to do withthe original vulnerability, though, and everything to do with howcryptographic security is managed in the kernel. Figuring prominently inthe discussion was the question of whether theoretical security can undermine security in thereal world.