Hi Ismael,

I think we're talking past each other. Even in the OS world, binaries are distributed - through apt, snap stores, flatpak, etc. When a maintainer uploads a .deb or someone publishes a snap, those binaries need verification.

The point of post-hoc/forensic reproducibility is being able to verify ANY binary matches its claimed source, regardless of whether the build system was designed for reproducibility. This is just as relevant for OS packages as anything else.

Many packaging systems (like snaps) weren't designed with reproducibility in mind. Post-hoc techniques are often the only way to verify what users are actually installing.

Reproducibility is fundamentally about transferable trust - whether that's between OS maintainers or between any developer and their users.

Best regards,

Leo

On 6/29/25 15:01, Ismael Luceno wrote:
El 29 de junio de 2025 12:23:56 UTC, Leo Wandersleb <[email protected]> 
escribió:
*2. Post-hoc/Forensic Reproducibility*Artifacts that can be reproduced even 
when the original author didn't specifically design for it. At 
walletscrutiny.com, we often reverse-engineer build processes, figure out the 
exact build environment, and successfully reproduce binaries that were never 
intended to be reproducible. This is equally valuable for security verification.
 From the perspective of an OS this doesn't make sense because we shouldn't be 
taking any binaries ever, we're comparing builds among us, perhaps even just in 
the time domain, but definitely not with upstreams.


Reply via email to