Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can verify that the executable came from the same sources: https://reproducible-builds.org/.


How do you know the tools you use to verify weren’t modified in memory?

Seriously. It is not possible to prove 100% security. Between human, electrical, hardware, firmware, and software vulnerabilities, there is always a gap.


Nothing is ever 100%, but some things are good enough. By the way, I am using Qubes OS for reasonable security.


You’ve absolutely illustrated my two points: 1) nothing is ever 100%, and 2) everyone thinks their personal choices are the ideal; anything less secure is playing with fire, anything more secure is unnecessary overkill.


There is no need to be 100% secure at all. All you need is to make hacking you more expensive than what you get if successful. I'm sure it works well with Qubes, if you use it in the right way.


How do I obtain the all the executables in the chain?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: