On 6/14/11 2:41 PM, Daniel Gibson wrote:
Am 14.06.2011 21:34, schrieb Robert Clipsham:
On 14/06/2011 20:07, Andrei Alexandrescu wrote:
On 6/14/11 1:22 PM, Robert Clipsham wrote:
On 14/06/2011 14:53, Andrei Alexandrescu wrote:
http://www.wikiservice.at/d/wiki.cgi?LanguageDevel/DIPs/DIP11

Destroy.


Andrei

This doesn't seem like the right solution to the problem - the correct
solution, in my opinion, is to have a build tool/package manager handle
this, not the compiler.

Problems I see:
* Remote server gets hacked, everyone using the library now
executes malicious code

This liability is not different from a traditional setup.

Perhaps, but with a proper package management tool this can be avoided
with sha sums etc, this can't happen with a direct get. Admittedly this
line of defense falls if the intermediate server is hacked.


Signing the files/hashes with GPG helps (as long as the developers
private key isn't on the server).

Could you please add a subsection to the trust model discussing such a possibility?

Thanks,

Andrei

Reply via email to