{"id":185531,"date":"2017-03-31T06:42:27","date_gmt":"2017-03-31T10:42:27","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/mozilla-project-keeps-compromised-apps-out-of-circulation-infoworld\/"},"modified":"2017-03-31T06:42:27","modified_gmt":"2017-03-31T10:42:27","slug":"mozilla-project-keeps-compromised-apps-out-of-circulation-infoworld","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/mozilla-project-keeps-compromised-apps-out-of-circulation-infoworld\/","title":{"rendered":"Mozilla project keeps compromised apps out of circulation &#8211; InfoWorld"},"content":{"rendered":"<p><p>        Informed news analysis every weekday      <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      Mozilla has long used itsFirefox browser as a staging      platform for other innovations. One of the first real-world      applications for its fast-and-safe systems language Rust, for      instance, is rewriting some of Firefox's innards.    <\/p>\n<p>      Now comes a project called Binary Transparency, an effort to      ensure that every Firefox binary produced by Mozilla is the      same one that everyone else has received and hasn't      potentially been tampered with.    <\/p>\n<p>      At first this sounds like a glorified version of using hash      signatures or checksums, which most every organization that      supplies binaries of its apps does. But Mozilla has a more      ambitious plan: To make it difficult for anyone to distribute      compromised copies of an application, even if they come from      Mozilla.    <\/p>\n<p>      Mozilla's plan, documented in a wiki entry, expands on      the existing processes for generating checksums from Firefox      binaries. First, a hex string from a composite of the      checksums of each binary component is generated, then that      hex string is used as a domain name. Mozilla then obtains an      X.509 certificate from a certification authority using that      domain name and posts the certificate in a public log.    <\/p>\n<p>      With this method, instead of generating a checksum for the      binary and posting it somewhere (that is, a wiki), there's an      irrevocable record of the checksum made available by      authorities not affiliated with Mozilla. This not only      ensures that users downloading a new copy of Firefox don't      get smacked with a bogus binary, but also gives Firefox's      updater a mechanism it can use to make sure it doesn't      unwittingly fetch a maliciously crafted payload.    <\/p>\n<p>      Fans of blockchain technology will see a kindred concept      here. Mozilla is taking data about its binaries and putting      it into a (theoretically) immutable public ledger. By using      certification authorities, Mozilla works with a familiar      entity that has plenty of infrastructure to support its use.    <\/p>\n<p>      Mozilla's efforts with tamper-proofing also is a prelude to      even more ambitious integrity checks. One of them is      providing reproducible builds of Firefox to guarantee that      the binaries produced for a specific application came from a      given, verified source code tree and not from one that's been      altered.    <\/p>\n<p>      It's harder than it might seem to guarantee such bit-exact      softwarebuilds. Even an item as innocuous as a      timestamp on a file can produce an entirely different      checksum for the whole package, so the entire build system      has to be designed to take such factors into account.    <\/p>\n<p>      The reproducible build concept is not new, butthere's      been a resurgence of interest in making reproducible builds a      practical and standardized concern. The Linux Foundation's      CII (Core Infrastructure Initiative)       renewed financial support for such a project last year.      Many free software projects, from Linux distributions      (Debian      in particular) to trusted applications like the bitcoin      clients or the Tor browser, employ reproducible build      strategies. Google's Bazel build tool,       open-sourced in 2015, supports reproducible builds as      part of its mission statement.    <\/p>\n<p>      Getting Firefox to use a reproducible build system has been      on the agenda since 2013, but not as a      high-priority item, in big part because Firefox's build      system isn't currently designed to allow it. One issue in      particular that creates problems is PGO (profile guided optimization), which      optimizes binaries based on details gleaned from running the      application. It's theoretically possible to make PGO play      nice with reproducible builds, but like reproducibility in      Firefox, it's a work in progress.    <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.infoworld.com\/article\/3186729\/web-browsers\/mozilla-project-keeps-compromised-apps-out-of-circulation.html\" title=\"Mozilla project keeps compromised apps out of circulation - InfoWorld\">Mozilla project keeps compromised apps out of circulation - InfoWorld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Informed news analysis every weekday Your message has been sent.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/mozilla-project-keeps-compromised-apps-out-of-circulation-infoworld\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-185531","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185531"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=185531"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185531\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=185531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=185531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=185531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}