On 10 August 2013 16:43, Michael Rogers <mich...@briarproject.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 09/08/13 17:43, Reed Black wrote:
>> CryptoCat is served up by the Chrome app store. Do you have
>> control over what binary gets distributed to who? Does any assurace
>> exist beyond the app store's own signing validation?
>>
>> I thought this was like webmasters and third-party script
>> inclusions. They will be blind if Google or DoubleClick are
>> compelled to selectively swap out the scripts they serve to
>> millions of third-party sites.
>
> If we assume that app stores aren't going away any time soon, we need
> to address this problem: How can a user who downloads an app from an
> app store be satisfied that it was built from published source code?
>
> We might also think about how to solve the problem for apps downloaded
> through browsers.
>
> Verifiable builds are necessary but not sufficient here - they allow
> an expert auditor to tell whether the binary she downloaded was built
> from the published source, but an attacker might target the binaries
> downloaded by certain other users without alerting the auditor. So we
> also need a way for a non-expert user to tell whether the binary she
> downloaded matches the one that was audited.
>
> PGP signatures and hashes aren't currently usable by non-experts, and
> signatures or hashes published through the same channel as the binary
> can be tampered with in the same way as the binary.
>
> Something along the lines of Certificate Transparency might be useful
> here: a public log of software names, versions, and hashes, which a
> browser or other download tool can use to verify downloaded binaries
> without any manual steps needing to be taken by the user. Software
> publishers would be responsible for adding entries to the log for
> their own software and monitoring the log for entries added by anyone
> else.

FWIW, the Certificate Transparency code already has (primitive)
support for Binary Transparency:
https://code.google.com/p/certificate-transparency/source/browse/src/server/blob-server.cc.

Patches, as always, welcome.

>
> Cheers,
> Michael
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
>
> iQEcBAEBAgAGBQJSBl+QAAoJEBEET9GfxSfMlVAIAJ/JEwbbZBdihiuUT6PEas9v
> Bs/eOnr/+/oTvjVJc/OJvcSHXWr8ne97N3kGzBrQsS6HdiDoxZdUMC/9S+WGLQuG
> boMD1MJH2qpPQzA7yG0ZDKWUodg+IvHZosC50ahC+su6zZ176Ic/8v4zzDDxnzF5
> zLqtY/jhZSrvmdaWixx4yznmrWbOXo1zxb+ulSDZWZ4TIHZKC+890d4CVGDzFNjY
> Yzyz0E3BRX7Ctkbt2dW/EqhBPKsG0FtMzwCsFMa6xPIUp5Ykf0YpQ0WF4n/sTJaO
> 8bY3HyAtxBAma/gZccDLP1OEkjPdaf27cxJNbcSoAYeKy4cqCOMWWXL/gLbuZqo=
> =QkIa
> -----END PGP SIGNATURE-----
> --
> Liberationtech is a public list whose archives are searchable on Google. 
> Violations of list guidelines will get you moderated: 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
> change to digest, or change password by emailing moderator at 
> compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to