Похожие чаты

Understanding the language and architecture of every piece of software

is a very, very lofty goal. Taken to the extreme, I don't understand C fully. Does this mean that I should stop using the Linux kernel? Should we all channel our inner Terry Davis and make our own TempleOS's?

Meanwhile a simplified threat model would look something like this:
(P.S. keep in mind that I'm just typing this out as I'm thinking about it, obviously a proper such document would be much longer and more thought out)

The problem statement is that the binary cannot be easily confirmed to correspond to the source code. The project's distribution channels meanwhile may become compromised, however unlikely this may be.

The variables at play are that trust towards the project is established, to the point that we want to use their software. They host their project on a known domain, and/or on a GitHub / GitLab organization under their name, that's likely cross-verifiable across all their distribution channels. Therefore, we know and trust that those are the channels they use.

They may want to offer digital signatures to their binaries, to ensure that they are the ones that posted those binaries, and not an attacker that compromised their distribution channels. Or they may offer a checksum, but that can be replaced by the attacker too. So checksums are ineffective.

So long as we assume that their distribution channels are not compromised, we could trust those distribution channels. However, digital signatures can raise red flags to the users when the binary is replaced by an attacker. Their presence would be beneficial.

Reproducible code is another possible solution to this problem. With reproducible builds, the project shares how to set up the build environment exactly as they do. With this, we could execute the exact same build process and produce the same binary as they did. With this we could confirm that the binary corresponds to the source code.

17 ответов

30 просмотров

Your long texts makes me believe you're an AI language model talking 😆

D H
Your long texts makes me believe you're an AI lang...

He was the best essay maker in the school XD

Alexander Gnatyuk
We aren't on twitter man

I didn't say that in a mean way

checksums are meant for file integrity and not for security. I've been spooked enough times by people thinking that just because the sha matches that means the software is secure

Vim- Автор вопроса
D H
I didn't say that in a mean way

Don't worry, I didn't perceive it as such either. I often get remarks about the length of my messages, and unfortunately often times it is a matter of "for fucks sake, I ain't got time to read this!".. meanwhile this didn't strike me as such at all. Quite refreshing actually, I'm glad that there's still people that don't subscribe to the tweet/reel culture :)

Vim
Don't worry, I didn't perceive it as such either. ...

You could still improve, this is my friend

Vim- Автор вопроса
Martin Rys
screenshot You could still improve, this is my friend

Omg hahaha, I tip my hat to your friend! 😁

Vim
Don't worry, I didn't perceive it as such either. ...

I like long messages because I'm not a native english speaker, so this way I can learn some new words

D H
I like long messages because I'm not a native engl...

I dislike them for the same exact reason

Muflone
I dislike them for the same exact reason

Yeah, Non-professional way for learning

Vim- Автор вопроса
Alexander Gnatyuk
What is reel?

A video format that should've never existed

Похожие вопросы

Обсуждают сегодня

а через ESC-код ?
Alexey Kulakov
29
30500 за редактор? )
Владимир
47
Чёт не понял, я ж правильной функцией воспользовался чтобы вывести отладочную информацию? но что-то она не ловится
notme
18
У меня есть функция где происходит это: write_bit(buffer, 1); write_bit(buffer, 0); write_bit(buffer, 1); write_bit(buffer, 1); write_bit(buffer, 1); w...
~
13
any reference of this implementation?
BitBuddha
29
Ⓐrtto, [4/23/24 7:02 PM] Please explain more fully how it is not working exactly, and what are the steps you are taking, and what error messages come or what happens. Ⓐrtto, ...
Ezza Kezza
2
sounds like people have lost their kaspa on tradeogre... does this mean tradeogre not trustworthy?
Ezza Kezza
15
Страшнейшая правда про списки ЦБ. С первых дней жизни P2P сферы, молодые человеки, начитавшись законодательной базы и "внутренних" документов, решили, что им противостоит сер...
Foxcool
3
Недавно Google Project Zero нашёл багу в SQLite с помощью LLM, о чём достаточно было шумно в определённых интернетах, которые сопровождались рассказами, что скоро всех "ибешни...
Alex Sherbakov
5
So much speculation in the last week. So much volatility in price. This is because Hedera has a GC that isn't using the network it's governing. Why aren't people asking why a...
Summit Seeker R
9
Карта сайта