Deterministic Builds
2013-08-23 20:42:10.140911+00 by Dan Lyke 1 comments
Tor: Determistic Builds Part One: Cyberwar and Global Compromise.
The short answer is: to protect against targeted attacks. Current popular software development practices simply cannot survive targeted attacks of the scale and scope that we are seeing today. In fact, I believe we're just about to witness the first examples of large scale "watering hole" attacks. This would be malware that attacks the software development and build processes themselves to distribute copies of itself to tens or even hundreds of millions of machines in a single, officially signed, instantaneous update.