[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Deterministic Builds (was [Re: wacky question])



On Thu, 2013-06-20 at 03:32 -0400, Sean Alexandre wrote:

> There was an interesting post on this the other day on the liberationtech mailing list
> by Mike Perry from the Tor Project:
> 
> Deterministic builds and software trust
> https://mailman.stanford.edu/pipermail/liberationtech/2013-June/009257.html
> 
> To quote:
> 
> > For the past several years, we've been seeing a steady increase in the
> > weaponization, stockpiling, and the use of exploits by multiple
> > governments, and by multiple *areas* of multiple governments. This
> > includes weaponized exploits specifically designed to "bridge the air
> > gap", by attacking software/hardware USB stacks, disconnected Bluetooth
> > interfaces, disconnected Wifi interfaces, etc. Even if these exploits
> > themselves don't leak (ha!), the fact that they are known to exist means
> > that other parties can begin looking for them.

> 
> Also related, Bruce Scheier just wrote an interesting piece on weaponized exploits, on 
> how the NSA is planting logic bombs and backdoors in machines and routers around the 
> world:
> 
> Has U.S. started an Internet war?
> www.cnn.com/2013/06/18/opinion/schneier-cyberwar-policy
> 
> 

Interesting links, thanks.


Reply to: