summaryrefslogtreecommitdiff
path: root/81/06130bfdb6e7ff7ce66c115ce4482fc30b3f36
blob: 6c0a3cdf0f54d08dd197aa011d8d801cfe8e9b03 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
	helo=mx.sourceforge.net)
	by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <adam@cypherspace.org>) id 1Vz4VD-0006L5-3J
	for bitcoin-development@lists.sourceforge.net;
	Fri, 03 Jan 2014 13:09:27 +0000
X-ACL-Warn: 
Received: from mout.perfora.net ([74.208.4.195])
	by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.76) id 1Vz4VB-0002bY-Gk
	for bitcoin-development@lists.sourceforge.net;
	Fri, 03 Jan 2014 13:09:27 +0000
Received: from netbook (88-105-1-32.dynamic.dsl.as9105.com [88.105.1.32])
	by mrelay.perfora.net (node=mrus3) with ESMTP (Nemesis)
	id 0LbMqQ-1Va9rc20JW-00kmfq; Fri, 03 Jan 2014 08:09:18 -0500
Received: by netbook (Postfix, from userid 1000)
	id EB6042E4A57; Fri,  3 Jan 2014 14:09:12 +0100 (CET)
Received: by flare (hashcash-sendmail, from uid 1000);
	Fri, 3 Jan 2014 14:09:12 +0100
Date: Fri, 3 Jan 2014 14:09:11 +0100
From: Adam Back <adam@cypherspace.org>
To: Tier Nolan <tier.nolan@gmail.com>
Message-ID: <20140103130911.GA12653@netbook.cypherspace.org>
References: <52A435EA.7090405@gmail.com> <201312081237.24473.luke@dashjr.org>
	<CANAnSg2OrmQAcZ+cZdtQeADicH3U29QOgYPfP1AQhOMP6+P1wg@mail.gmail.com>
	<CAAS2fgR0khyJxmz9c2Oc87hOFgiNuiPJuaeugGajdo_EcKEW9w@mail.gmail.com>
	<20131212205106.GA4572@netbook.cypherspace.org>
	<CANAnSg3nPhrk2k=yDKf39AuBQnSuTWJbgANdMhGe=soiOy0NTw@mail.gmail.com>
	<CAAS2fgTmWRMxYweu3sNn_X7grgjUqTQujM-DbZRxG_YMZnD=7g@mail.gmail.com>
	<20140103054515.GL3180@nl.grid.coop>
	<CANAnSg0esEMQ+G=9F2zK6okcewT6NdYBFnXHmyHz8VR4AAp0nw@mail.gmail.com>
	<CAE-z3OV2jxwO0t2NcJSmJM5WH5aWZtSv3JxhFs0wNMA_PQ257w@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Disposition: inline
In-Reply-To: <CAE-z3OV2jxwO0t2NcJSmJM5WH5aWZtSv3JxhFs0wNMA_PQ257w@mail.gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Hashcash: 1:20:140103:tier.nolan@gmail.com::jfFiKEX44yNICJm4:00000000000000000
	0000000000000000000000001zsO
X-Hashcash: 1:20:140103:bitcoin-development@lists.sourceforge.net::XhYu64mu5o+KC
	ttz:0000000000000000000008rp
X-Hashcash: 1:20:140103:adam@cypherspace.org::55nwJyH+pyUmxaWJ:00000000000000000
	0000000000000000000000003QDE
X-Provags-ID: V02:K0:pVTi5kv6sorXXrbWS+Q099UBQR4q8VZf7bDLU16fACS
	xfCcV4ZtcWG135JxEPdA4OQg/+nw/TMWzKDSmneLVkQdGAjNjD
	qMqj1Jux5mwn0qPB3EAnTdA8aKQ/gbt5SNH5TNZkzcmZGrP6LF
	Yhoz1lEwQDc3vjch/9dQmvnq+I4845nNqNGcmN0Ede7En/YEqD
	3Ass4NFou+ajeBTH67rbK4q7fd9qMx3NQrEy25SD6ahLZ6PelB
	0rBCFpILt09Pm4bP9IPIR+FZwI64xtj5c3UC69nKRv3jCFTZOy
	JiA7Ykh6jrTqNr+oRxEwNa69qjnHeKsptJ3TCs8GV9y9Nwe72P
	4033bkrpjwO6MLN4S/IwOPJ9B3lFDRHjuGIYIZjCH
X-Spam-Score: -0.0 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,
	no trust [74.208.4.195 listed in list.dnswl.org]
	-0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
X-Headers-End: 1Vz4VB-0002bY-Gk
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Dedicated server for bitcoin.org,
 your thoughts?
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Fri, 03 Jan 2014 13:09:27 -0000

You know if you want to make some form of investment, you might like make an
attempt to look them up on the internet, check the phone number in a phone
book or directory enquiries, look for references and reviews?

So it is with the hash of the binary you are about to trust with your
investment funds.  I dont think its such a difficult question.  Ask your
more technical friends to confirm this hash is correct.

Its interesting that hashes are more trustworthy than signatures, since all
the NSLs and backdoors, its hard to trust a signature.

I have the same problem with linux distros that want to install hundreds of
components downloaded over the internet, based on signatures.  I would far
rather a merkle hash of the distribution at that point in time, which
authenticates directly any of the optional downloadable components.

(Or better yet a distro that like comes on a CD and doesnt download
anything...  Amazing how most CD and even DVD iso images immediately
download stupid things like fonts???  What were they thinking?  I downloaded
fedora > 4GB of stuff and they need to download a font just to get past step
2 of the installer?  Thats a sensless, retrograde, selective backdoor
opportunity.)

Adam

On Fri, Jan 03, 2014 at 11:22:35AM +0000, Tier Nolan wrote:
>   On Fri, Jan 3, 2014 at 9:59 AM, Drak <[1]drak@zikula.org> wrote:
>
>   Which is why, as pointed out several times at 30c3 by several renowned
>   figures, why cryptography has remained squarely outside of mainstream
>   use. It needs to just work and until you can trust the connection and
>   what the end point sends you, automatically, it's a big fail and the
>   attack vectors are many.
>   <sarcasm>I can just see my mother or grandma manually checking the hash
>   of a download... </sarcasm>
>
>   Maybe a simple compromise would be to add a secure downloader to the
>   bitcoin client.
>   The download link could point to a meta-data file that has info on the
>   download.
>   file_url=
>   hash_url=
>   sig_url=
>   message=This is version x.y.z of the bitcoin client
>   It still suffers from the root CA problem though.  The bitcoin client
>   would accept Gavin's signature or a "core team" signature.
>   At least it would provide forward security.
>   It could also be used to download files for different projects, with
>   explicit warnings that you are adding a new trusted key.
>   When you try to download, you would be given a window
>   Project: Some Alternative Wallet
>   Signed by: P. Lead
>   Message:
>   Confirm download Yes No
>   However, even if you do that, each trusted key is only linked to a
>   particular project.
>   It would say if the project and/or leader is unknown.
>
>References
>
>   1. mailto:drak@zikula.org

>------------------------------------------------------------------------------
>Rapidly troubleshoot problems before they affect your business. Most IT
>organizations don't have a clear picture of how application performance
>affects their revenue. With AppDynamics, you get 100% visibility into your
>Java,.NET, & PHP application. Start your 15-day FREE TRIAL of AppDynamics Pro!
>http://pubads.g.doubleclick.net/gampad/clk?id=84349831&iu=/4140/ostg.clktrk

>_______________________________________________
>Bitcoin-development mailing list
>Bitcoin-development@lists.sourceforge.net
>https://lists.sourceforge.net/lists/listinfo/bitcoin-development