Re: Deterministic Builds (was [Re: wacky question])
On Thu, 2013-06-20 at 03:32 -0400, Sean Alexandre wrote:
> There was an interesting post on this the other day on the liberationtech mailing list
> by Mike Perry from the Tor Project:
>
> Deterministic builds and software trust
> https://mailman.stanford.edu/pipermail/liberationtech/2013-June/009257.html
>
> To quote:
>
> > For the past several years, we've been seeing a steady increase in the
> > weaponization, stockpiling, and the use of exploits by multiple
> > governments, and by multiple *areas* of multiple governments. This
> > includes weaponized exploits specifically designed to "bridge the air
> > gap", by attacking software/hardware USB stacks, disconnected Bluetooth
> > interfaces, disconnected Wifi interfaces, etc. Even if these exploits
> > themselves don't leak (ha!), the fact that they are known to exist means
> > that other parties can begin looking for them.
>
> Also related, Bruce Scheier just wrote an interesting piece on weaponized exploits, on
> how the NSA is planting logic bombs and backdoors in machines and routers around the
> world:
>
> Has U.S. started an Internet war?
> www.cnn.com/2013/06/18/opinion/schneier-cyberwar-policy
>
>
Interesting links, thanks.
Reply to: