Nick <liberationt...@njw.me.uk> writes:
>The wonderful F-Droid already does this, as pointed out in the 
>article. So it doesn't seem like a proposal so much as an 
>explanation of why it's important.

F-Droid does a lot of this.  I couldn't find a standard way to get the
exact source snapshot a particular app's build comes, nor what the build
parameters were, although via the web site the app pages do give release
numbers.  They're hard at work on deterministic builds now, apparently,
and I would guess that some of these essentially UI fixes will happen
along with that.

(I don't mean to sound like a complainer: F-Droid is fantastic.  I just
hope they'll take it all the way :-) ).

>But to be honest I'm not sure why people who are happy to use a 
>completely proprietary mobile computing system would care that much 
>about this.  They have already voted with their feet that freedom 
>(and by extension security and privacy) are not important to them.  
>Sure, there may be plenty of people who are ignorant enough of how 
>computers actually work to not realise the sacrifices they're 
>making, but I don't think this article is targeted for them.

It's about reducing the number of exposure points.  With most app
stores, you have to trust the author for each app you have installed,
*and* you have to trust the app store.  If you can get that down even to
just having to trust the app store, that's still a win.

One can't just say security and privacy "are" or "are not" important to
someone -- it's a matter of tradeoffs.  Different people have different
tradeoffs they want to make; app stores that offer verified open source
apps give them more of a continuum along which to make that decision.

Best,
-K
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to