What if we just reach out to everyone currently in queue and ask them to
use the golang version (and save the binaries)

On Fri, Mar 9, 2018 at 2:57 PM, Devrandom <c1.devran...@niftybox.net> wrote:

> I can take care of the first bullet point (hopefully on ARM64), but would
> be nice if we had more than one additional round with golang.
>
>
> On Fri, Mar 9, 2018 at 11:22 AM Andrew Miller <soc1...@illinois.edu>
> wrote:
>
>> It sounds like an efficient way to dispense with the suggestions
>> Devrandom raised are to:
>> 1. Do a round with the deterministic Go build, explicitly saving the
>> binary for posthoc analysis, and ideally running it on a non x86
>> architecture if anyone has one...
>> 2. Do a round with mrustc
>> What would it take to get a concrete plan to include those?
>>
>> On Fri, Mar 9, 2018 at 2:17 PM, Sean Bowe <s...@z.cash> wrote:
>>
>>> As far as security goes, we've successfully guarded against all but
>>> the most elaborate and unrealistic attack scenarios. The remaining
>>> threats require some combinatorial explosion of individually
>>> sophisticated attacks or breakthroughs, like stealthy backdoors in the
>>> Rust compiler and still for many participants to be colluding in
>>> secret, somehow without leaving evidence behind.
>>>
>>> We don't need an absolutely perfect ceremony to get strong privacy
>>> guarantees, we get that already even with a totally compromised
>>> ceremony. We *could* continue to invest time and resources for many
>>> more months or years in order to make us marginally more resistant to
>>> these absurd attack scenarios, but by the time we'd be finished with
>>> the ceremony we'll probably have better proving systems available
>>> anyway. It's silly to let privacy languish in the meantime.
>>>
>>> I think we did the best with the time we had, but if you disagree,
>>> remember that all of this can be extended and improved by anyone, even
>>> after this ceremony is done!
>>>
>>> Sean
>>>
>>
>>> On Fri, Mar 9, 2018 at 11:06 AM, Peter Todd <p...@petertodd.org> wrote:
>>>
>> > On Fri, Mar 09, 2018 at 04:49:37PM +0000, Devrandom wrote:
>>> >> Hi all,
>>> >>
>>> >> I have some concerns about the lack of diversity of contributions:
>>> >>
>>> >> - most (all?) of the contributions used a distributed Rust toolchain,
>>> which
>>> >> suffers from the "trusting-trust" issue since they are
>>> self-compiled.  I
>>> >> don't think I've seen any contributions using the mrustc build path.
>>> >> - there were very few contributions (two?) using the golang
>>> implementation
>>> >> - no attempt has been made to replicate the deterministic golang build
>>> >> - people did not capture the binary they used, so we can't do
>>> forensics in
>>> >> case of future questions
>>> >> - there were no contributions using alternative processor
>>> architectures
>>> >> (e.g. ARM64).  I believe this is possible using the golang
>>> implementation.
>>> >> - there was a lot of focus on destroying toxic waste and not enough
>>> on the
>>> >> trustworthiness of the tools
>>> >
>>> > I agree with all these points, particularly the latter: we should be
>>> focused on
>>> > genuine security, not flashy marketing stunts. (indeed, I regret the
>>> way my own
>>> > participation was marketted the last time around)
>>> >
>>> > --
>>> > https://petertodd.org 'peter'[:-1]@petertodd.org
>>>
>>
>> --
>> Andrew Miller
>> University of Illinois at Urbana-Champaign
>>
>


-- 
Andrew Miller
University of Illinois at Urbana-Champaign

Reply via email to