That's a good idea. Also, please let me know if I can have my turn on Sunday.
On Fri, Mar 9, 2018 at 12:06 PM Andrew Miller <soc1...@illinois.edu> wrote: > What if we just reach out to everyone currently in queue and ask them to > use the golang version (and save the binaries) > > On Fri, Mar 9, 2018 at 2:57 PM, Devrandom <c1.devran...@niftybox.net> > wrote: > >> I can take care of the first bullet point (hopefully on ARM64), but would >> be nice if we had more than one additional round with golang. >> > On Fri, Mar 9, 2018 at 11:22 AM Andrew Miller <soc1...@illinois.edu> >> wrote: >> > It sounds like an efficient way to dispense with the suggestions Devrandom >>> raised are to: >>> 1. Do a round with the deterministic Go build, explicitly saving the >>> binary for posthoc analysis, and ideally running it on a non x86 >>> architecture if anyone has one... >>> 2. Do a round with mrustc >>> What would it take to get a concrete plan to include those? >>> >>> On Fri, Mar 9, 2018 at 2:17 PM, Sean Bowe <s...@z.cash> wrote: >>> >>>> As far as security goes, we've successfully guarded against all but >>>> the most elaborate and unrealistic attack scenarios. The remaining >>>> threats require some combinatorial explosion of individually >>>> sophisticated attacks or breakthroughs, like stealthy backdoors in the >>>> Rust compiler and still for many participants to be colluding in >>>> secret, somehow without leaving evidence behind. >>>> >>>> We don't need an absolutely perfect ceremony to get strong privacy >>>> guarantees, we get that already even with a totally compromised >>>> ceremony. We *could* continue to invest time and resources for many >>>> more months or years in order to make us marginally more resistant to >>>> these absurd attack scenarios, but by the time we'd be finished with >>>> the ceremony we'll probably have better proving systems available >>>> anyway. It's silly to let privacy languish in the meantime. >>>> >>>> I think we did the best with the time we had, but if you disagree, >>>> remember that all of this can be extended and improved by anyone, even >>>> after this ceremony is done! >>>> >>>> Sean >>>> >>> >>>> On Fri, Mar 9, 2018 at 11:06 AM, Peter Todd <p...@petertodd.org> wrote: >>>> >>> > On Fri, Mar 09, 2018 at 04:49:37PM +0000, Devrandom wrote: >>>> >> Hi all, >>>> >> >>>> >> I have some concerns about the lack of diversity of contributions: >>>> >> >>>> >> - most (all?) of the contributions used a distributed Rust >>>> toolchain, which >>>> >> suffers from the "trusting-trust" issue since they are >>>> self-compiled. I >>>> >> don't think I've seen any contributions using the mrustc build path. >>>> >> - there were very few contributions (two?) using the golang >>>> implementation >>>> >> - no attempt has been made to replicate the deterministic golang >>>> build >>>> >> - people did not capture the binary they used, so we can't do >>>> forensics in >>>> >> case of future questions >>>> >> - there were no contributions using alternative processor >>>> architectures >>>> >> (e.g. ARM64). I believe this is possible using the golang >>>> implementation. >>>> >> - there was a lot of focus on destroying toxic waste and not enough >>>> on the >>>> >> trustworthiness of the tools >>>> > >>>> > I agree with all these points, particularly the latter: we should be >>>> focused on >>>> > genuine security, not flashy marketing stunts. (indeed, I regret the >>>> way my own >>>> > participation was marketted the last time around) >>>> > >>>> > -- >>>> > https://petertodd.org 'peter'[:-1]@petertodd.org >>>> >>> >>> -- >>> Andrew Miller >>> University of Illinois at Urbana-Champaign >>> >> > > > -- > Andrew Miller > University of Illinois at Urbana-Champaign >