Delivery-Date: Sun, 07 Dec 2014 07:46:44 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY,
	URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id DEF431E0349;
	Sun,  7 Dec 2014 07:46:42 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id A259631E2D;
	Sun,  7 Dec 2014 12:46:40 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 8BAE231E32
 for <tor-talk@lists.torproject.org>; Sun,  7 Dec 2014 12:46:36 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id C7z2d_vCVk_I for <tor-talk@lists.torproject.org>;
 Sun,  7 Dec 2014 12:46:36 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 5654131E23
 for <tor-talk@lists.torproject.org>; Sun,  7 Dec 2014 12:46:33 +0000 (UTC)
Received: from berryeater.riseup.net (berryeater-pn.riseup.net [10.0.1.120])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK))
 by mx1.riseup.net (Postfix) with ESMTPS id B73A44190C
 for <tor-talk@lists.torproject.org>; Sun,  7 Dec 2014 12:46:30 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
 t=1417956390; bh=WzLj484RGOAll9er5g+Hwu4vXRkDRAI/Da15CwtakhU=;
 h=Date:From:To:Subject:References:In-Reply-To:From;
 b=QW/au6yyVldewe+qjb8bfzpGXz0ZKYrVKpzIaCNGQ9sfys1CXBKKNejcxccuIS/95
 gCt3mRZ8xSKVVC8cbU/rSJIWx8Jq/yUG7N1W19ECuMo719ZRHyYR7phicVe+LcMGkJ
 W93oo8sYSvDHq40fNT540O24pqwa8RgYeWOSL1OY=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: flapflap) with ESMTPSA id 9B5EE40E0C
Message-ID: <54844C00.1090008@riseup.net>
Date: Sun, 07 Dec 2014 12:45:52 +0000
From: flapflap <flapflap@riseup.net>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <20141207023823.15123l26w3vbay2o@www.vfemail.net>
 <CAJVRA1RaBkxNGLmTSSDOLSNijeTYX0EohOOeCw+LLMfeDJJ-kg@mail.gmail.com>
 <20141207105039.GA28271@lo.psyced.org>
 <CAJVRA1RHjoKTFsELdm7pnpHEmPO-vZiio9AzhtbX4n=B8UoMcg@mail.gmail.com>
 <20141207120351.GA30113@lo.psyced.org>
In-Reply-To: <20141207120351.GA30113@lo.psyced.org>
X-Virus-Scanned: clamav-milter 0.98.4 at mx1
X-Virus-Status: Clean
Subject: Re: [tor-talk] Qubes? debian? binary? reproducible?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3443294705213474857=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3443294705213474857==
Content-Type: multipart/signed; micalg=pgp-sha512;
 protocol="application/pgp-signature";
 boundary="hFthtC1wL10LXWCqjodtTlFQiLJkO8qkc"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--hFthtC1wL10LXWCqjodtTlFQiLJkO8qkc
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

carlo von lynX wrote:
>>> My current state of information is such that any source-code
>>> based distribution is less likely to be affected by backdoors
>>> until debian and all derivates indeed ship reproducible binaries.
>>> If Whonix can be rebuilt from source, so can Qubes OS?
>>
>> how do you securely distribute sources to be built?  a source based
>> distribution has different trade-offs, rather than being immune to
>> tampering.
>=20
> Gentoo provides cryptographic hashes for all tars and zips it uses
> for over ten years now. It's really no black magic. Gentoo has other
> issues and I don't understand why there is so little interest in
> OS built from source. If techies were admitting what a crazy risk
> it is to trust binary distributions, maybe source-code based ones
> would be much more advanced usability-wise by now.
>=20
> But I acknowledge the work being done for reproducible debian and
> I wished I would also have time to participate in that.

You might as well be interested in GNU Guix
  https://www.gnu.org/software/guix/
a package manager for the GNU system.

It allows you to install pre-built packages, or just download the source
and build locally with separable build environments.
  https://www.gnu.org/software/guix/manual/guix.html#Features
  "Finally, Guix takes a purely functional approach to package
  management, as described in the introduction (see Introduction). Each
  /gnu/store package directory name contains a hash of all the inputs
  that were used to build that package=E2=80=94compiler, libraries, build=

  scripts, etc. This direct correspondence allows users to make sure a
  given package installation matches the current state of their
  distribution. It also helps maximize build reproducibility: thanks to
  the isolated build environments that are used, a given build is likely
  to yield bit-identical files when performed on different machines (see
  container).

  This foundation allows Guix to support transparent binary/source
  deployment. When a pre-built binary for a /gnu/store item is available
  from an external source=E2=80=94a substitute, Guix just downloads it an=
d
  unpacks it; otherwise, it builds the package from source, locally (see
  Substitutes)."

  https://www.gnu.org/software/guix/manual/guix.html#Substitutes
  "Today, each individual=E2=80=99s control over their own computing is a=
t the
  mercy of institutions, corporations, and groups with enough power and
  determination to subvert the computing infrastructure and exploit its
  weaknesses. While using hydra.gnu.org substitutes can be convenient,
  we encourage users to also build on their own, or even run their own
  build farm, such that hydra.gnu.org is less of an interesting target.

  Guix has the foundations to maximize build reproducibility (see
  Features). In most cases, independent builds of a given package or
  derivation should yield bit-identical results. Thus, through a diverse
  set of independent package builds, we can strengthen the integrity of
  our systems.

  In the future, we want Guix to have support to publish and retrieve
  binaries to/from other users, in a peer-to-peer fashion. If you would
  like to discuss this project, join us on guix-devel@gnu.org."

An interesting talk on Guix was given this August at GNU Hacker's
Meeting:
http://audio-video.gnu.org/video/ghm2014/2014-08--courtes--were-building-=
the-gnu-system--ghm.webm

~flapflap


--hFthtC1wL10LXWCqjodtTlFQiLJkO8qkc
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=HT/M
-----END PGP SIGNATURE-----

--hFthtC1wL10LXWCqjodtTlFQiLJkO8qkc--

--===============3443294705213474857==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============3443294705213474857==--

