Regarding this particular attack, isn't it addressed by reproducible builds?<p>If the bitcoin software binaries are being replaced by nefarious actors, the hashes would conflict by those generated by source compilation. Is there a reason this doesn't work?