TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Security challenges for the Qubes build process

64 点作者 kkl将近 9 年前

4 条评论

wongarsu将近 9 年前
Their build process sounds similar to Bitcoin Core&#x27;s release process.<p>Bitcoin downloads dependencies, checks them against their preconfigured hashes and then builds the different versions (Windows, Linux, Mac) in different VMs. The build is deterministic and thus produce the exact same files for everybody. Everyone signs the files they produced and uploads the signature. If all the signatures are valid for the same file you can be reasonably sure that the build process wasn&#x27;t tampered with.<p>Getting deterministic builds even for a project like Bitcoin Core with few dependencies was hard. On the scale of Qubes this would be a monumental task. But maybe Debian&#x27;s initative for reproducible builds makes this easier in the future.
评论 #11803064 未加载
gaius将近 9 年前
Rutkowska is surely doing some of the most interesting research in this field.
评论 #11803201 未加载
评论 #11803727 未加载
nickpsecurity将近 9 年前
Anyone interesting in securing repo&#x27;s or build systems should start with Wheeler&#x27;s landmark collection on the topic:<p><a href="http:&#x2F;&#x2F;www.dwheeler.com&#x2F;essays&#x2F;scm-security.html" rel="nofollow">http:&#x2F;&#x2F;www.dwheeler.com&#x2F;essays&#x2F;scm-security.html</a><p>Has basics in English, CompSci work, high-assurance considerations, and some example projects. A bright, security researcher that&#x27;s very familiar with DVCS&#x27;s should redo this in light of them with similar recommendations. More like a team of bright researchers but it needs to be done. I&#x27;m interested in any papers people already have on this that have similarly-thorough treatment of threat model and proposed mitigations.<p>Once you know builds, you might want to address subversion, design, implementations, covert channels, and other things if you&#x27;re trying to stop Five Eyes, Russia, or China. That requires &quot;high-assurance&quot; security methods... when it&#x27;s even possible... Got a small list here to get people started on how deep the issue goes just at high-level and subversion aspects:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10478742" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10478742</a>
d33将近 9 年前
I heard that Qubes is riddled with undocumented scripts that have no automated tests for them. Does anybody know how true is that?
评论 #11802537 未加载
评论 #11801324 未加载
评论 #11803110 未加载