Perry: Deterministic Builds Part One: Cyberwar and Global Compromise
[Posted August 22, 2013 by corbet]
Mike Perry
writes
about the motivations behind his deterministic build work on the Tor
Project blog. "
Current popular software development practices simply
cannot survive targeted attacks of the scale and scope that we are seeing
today. In fact, I believe we're just about to witness the first examples of
large scale 'watering hole' attacks. This would be malware that attacks the
software development and build processes themselves to distribute copies of
itself to tens or even hundreds of millions of machines in a single,
officially signed, instantaneous update. Deterministic, distributed builds
are perhaps the only way we can reliably prevent these types of targeted
attacks in the face of the endless stockpiling of weaponized exploits and
other 'cyberweapons'."
(
Log in to post comments)