Stretching out for trustworthy reproducible builds creating bit by bit identical binaries
- 
Not SyncedWelcome and good morning
- 
Not SyncedThis is the reproducible builds team,
 talking about
- 
Not Synced"Stretching out towards trustworthy
 computing"
- 
Not Synced[Applause]
- 
Not SyncedWe're 4 on stage, but actually this is a
 team effort.
- 
Not SyncedAll these people listed here have
 contributed to the project at one point.
- 
Not SyncedThe 4 of us, that's
- 
Not SyncedLunar − me
- 
Not Syncedthere's Dhole,
- 
Not SyncedChris Lamb − lamby
- 
Not Syncedand Holger.
- 
Not SyncedBut actually, this is DebConf and so a lot
 more of us have been or are
- 
Not Syncedcurrently here and so, if you want to
 thank anybody that is working on this
- 
Not Syncedyou need to actually thank all of
 these folks
- 
Not Synced'cause, yay.
- 
Not Synced[Applause]
- 
Not Synced[Holger] The people in blue are here.
- 
Not Synced[Lunar] Let's get started.
- 
Not SyncedQuick ??? on what we're talking
 about.
- 
Not SyncedWe have software, it's made from source.
- 
Not SyncedSource is readable by humans or at least
 a good amount of humans.
- 
Not SyncedIn this room it's good.
- 
Not SyncedBinary, readable by computer and some
 tiny fraction of humanity.
- 
Not SyncedGoing from source to binary is called
 build, or like building or compiling
- 
Not Syncedand we're doing free software and
 free software is awesome because
- 
Not Syncedwe can actually run these binaries like
 we want
- 
Not SyncedWe can actually study the software, how
 it's been made by studying the source
- 
Not Syncedand by studying the source we can assess
 that it does what it's supposed to do
- 
Not Syncedand not something else that does not
- 
Not Syncedhave malware, or trojans or security bugs
- 
Not SyncedSo we have the binary that can be used,
 fine.
- 
Not SyncedWe have the source that can be verified.
- 
Not SyncedProblem is that right now, the only way we
 know that a binary that we get…
- 
Not SyncedWe have to trust a website or a Debian
 repository that says
- 
Not Synced"Well, this binary has been made with this
 source"
- 
Not SyncedBut there's no way we can actually prove
 that.
- 
Not SyncedThis is actually a problem that has been
 well explained by
- 
Not SyncedMike Perry and Seth Schoen at the 31c3
 in Hamburg last december.
- 
Not SyncedFor example, Seth Schoen made a proof of
 concept exploit for the Linux kernel
- 
Not Syncedthat when GCC was called, the kernel would
 without modifying anything on the disk
- 
Not Syncedwhen the kernel detects that GCC is going
 to read a C file, it will insert some
- 
Not Syncedextra lines of code, and these lines of
 code can be a very bad thing
- 
Not Syncedin the case of 31c3 talk I was just
 recalling.
- 
Not SyncedActually, you can even have developpers
 who are in very good faith, who have
- 
Not Syncedtotally secure dev machines, or they
 thought they have,
- 
Not Syncedwho have reviewed all their source code
 for any bugs
- 
Not Syncedand we would still get totally owned as
 soon as their computer gets compromised
- 
Not Syncedor one of the build demons from Debian
 gets compromised for example.
              
Show all
            
            
            
            
           Debconf
 Debconf
