I’ve been spending time recently thinking about PGP signatures and SBT. Specifically, thinking about trust models, threat models, and how to realistically (read: both in meaning and in terms of user adoption) verify build artifacts. My conclusion thus far: everything is awful.
I'm concerned about this for Fury. How would you feel about Fury's installer being a readable bash script which builds it from sources it downloads from Github? You would still need to trust the Scala compiler that's used, at least until I can build that from source, too.
-
-
You would need hard-coded signature checks on the scala compiler and on the source tarball (and all its dependencies). Basically the same as what SBT needs to do, but with a source stage.
-
But you also need to verify that the CPU and JVM hasn't been compromised. So you need to build the same artifact on many machines and compare artifact hashes.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.