KernelBrief editorial policy
KernelBrief is an upstream-first Linux/FOSS intelligence feed. The goal is to reduce noise, not to replace original reporting.
Rules
- Prefer primary sources: release notes, security advisories, project blogs, mailing lists, git commits, distro notices.
- Link to original reporting prominently when a story depends on another publication's work.
- Summaries must be short, attributed where appropriate, and not a substitute for reading the source.
- No full-article scraping or republishing.
- RSS/Atom ingestion may store metadata, short excerpts, source URLs, and editorial notes only.
- AI can draft tags, summaries, duplicate checks, and metadata, but sensitive stories require human review.
- Label sponsored placements clearly.
- Label analysis, guidance, and opinion separately from factual news.
- Publish corrections visibly. See the corrections policy for how to submit corrections and what to expect.
- Do not amplify anonymous claims, malware rumors, security panic, or project drama without primary documentation.
- Keep RSS useful.
- Comments are for technical discussion: analysis, corrections, source links, project context, thoughtful disagreement, and relevant personal experience.
- Comments are moderated for relevance, technical substance, and civility. Images are not supported in comments.
Comment policy
Allowed:
- technical analysis
- corrections
- source links
- project context
- thoughtful disagreement
- relevant personal experience
Not allowed:
- explicit content
- personal attacks
- trolling
- flamebait
- politics tangents
- spam
- low-effort memes
- image posts
- AI-generated drive-by comments
- irrelevant self-promotion
Story format
Every important story should answer:
- What happened?
- Why does it matter?
- What is the primary source?
- Who is affected?
- What should a reader do, if anything?
Sensitive categories requiring human review
- Security vulnerabilities and CVEs
- License disputes
- Accusations against people or projects
- Layoffs, company closures, and legal disputes
- Malware/supply-chain incidents
- Political or governance conflicts inside projects