On Fri, Dec 11, 2015 at 7:10 AM, Tati Chevron <chev...@swabsit.com> wrote:
> Why would we trust your mirror?

A couple things to keep in mind here:

(1) Security can never be perfect.
(2) Security does not have to be perfect.

(That said... sometimes traditional computer security seems like
people are trying to put bank vault doors on picket fences. And, ok,
given the state of the internet, there's some validity to that
approach. But I imagine we should be thinking about other approaches,
also.)

Anyways, for distributions, you need good ways of detecting problems.
Then, when you find one, you will at least gain some information about
your threats.

So:

(1) shasums, and other signatures. The more the merrier, within
practical limits. They can be spoofed, but plausibly spoofing several
is difficult. You should expect attackers to want to hit easier
targets.

(2) out-of-band comparisons. This does not need to be frequent, but
needs to be happening. If people adopt rituals where they sometimes
download from websites, sometimes compare web site contents with cd
contents, and also sometimes check electronic copies of signatures
with paper copies, you will catch infections sooner or later. One of
the more important characteristics, here, is probably the time delays
in the comparisons.

(3) Have some ideas of what to do when you find a problem. Rewriting
or replacing or discarding the affected systems is one approach.
Involving people who have reason to care can be another approach. This
is where having a good audience can help - industry, politicians,
volunteer organizations, etc. all have an aspect where they try to
engage lots of people. If you are supporting them (don't worry too
much about the degree of support - it mostly doesn't matter) they'll
quite probably be happy to help when you need it (especially if they
can also see how to advance their own goals - which, ok, will
sometimes be a pain).

Anyways... there's plenty more nuances than this quick writeup. The
basic approach is to drive up the costs/effort required for
sophisticated and organized attackers while also catching the flaws
which will inevitably arise (through hardware failures if nothing
else, but school-age pranks are another plausible candidate for
problems).

I hope some of this helps,

-- 
Raul

P.S. the three biggest state-level threats are probably the three most
populated countries. China and India want to destroy some parts of
their populations while maintaining loyalty of their core population
(because they can't feed them all, but you can see this in the news,
for example in reports about rotting food, perhaps tons of it - people
are strange). The USA doesn't have the food issue and (because of its
structure) places a higher priority on popularity/loyalty, but is
under immense long-term pressure to fit in  (whatever that means). I'm
not sure what to do about any of that, but I think this point of view
does help understand what was happening with the NSA but also it's why
the whole "for the people" quip gets the emotional shadings that it
gets. I can't do much about this, but maybe someone else will have
some good ideas? And, of course, there's plenty of smaller countries
which have their own personality-driven issues, wars and malware
havens.

Reply via email to