January 27, 2026

Integrity—now with extra drama

Lennart Poettering, Christian Brauner founded a new company

Linux stars launch Amutable—hype vs “privacy nightmare” panic erupts

TLDR: Linux leaders launched Amutable to make Linux start and run only trusted code. The crowd is excited but wary, grilling the team about who controls the keys and what problem it actually solves, while the CEO jumps in to talk—yet specifics remain fuzzy, fueling both hype and anxiety.

Two open‑source heavyweights just dropped a bombshell. Lennart Poettering (the guy behind systemd) and Linux file‑system boss Christian Brauner unveiled a new venture, Amutable, promising “verifiable integrity” from build to boot to runtime—translation: your computer only runs what’s proven trustworthy. Sounds neat… until the comments section lit up like a server rack.

The top vibe? Suspicious optimism. One commenter wondered if Poettering has quietly left Microsoft, while another fired the line of the day: worry about a “privacy nightmare” if “who controls the keys” isn’t crystal clear. That’s the core drama—trust, but with whose keys? Meanwhile, Amutable’s CEO, Chris Kühl, literally appears in the thread saying he’s “happy to answer questions,” which only made folks hungrier for specifics. “What’s the first thing you’ll tackle?” demanded one. Another asked in plain English: Who is this for—security or reproducibility?

Techies also spiraled into a debate over what “immutable” and “atomic” even mean for operating systems, then immediately noticed the name pun: Amutable launching a business about not changing things. Cue memes about “integrity, but make it fashion.” Details are thin, the team is stacked (ex‑Kinvolk, Pantheon, and more), and the pitch is bold. The crowd is split between “finally, trustworthy Linux for real” and “cool idea, but don’t lock the world behind someone’s keys.” Popcorn secured, keys… not so much.

Key Points

  • Amutable is a new company focused on delivering cryptographically verifiable integrity for Linux workloads.
  • The company aims to ensure systems start in a verified state and remain trusted over time.
  • Its approach covers three areas: build integrity, boot integrity, and runtime integrity.
  • Executive team: Christian Brauner (CTO), Chris Kühl (CEO), Lennart Poettering (Chief Engineer), David Strauss (CPO).
  • Founding engineering team includes Aleksa Sarai, Daan De Meyer, Joaquim Rocha, Kai Lüke, Michael Vogt, Rodrigo Campos Catelin, and Zbyszek Jędrzejewski-Szmek.

Hottest takes

“privacy nightmare depending on who controls the keys” — jmclnx
“Happy to answer questions” — blixtra
“Who is this for / what problem does it solve?” — hahahahhaah
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.