this post was submitted on 10 Apr 2024
4 points (100.0% liked)
Security
5018 readers
1 users here now
Confidentiality Integrity Availability
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The author's own solution is not even sufficient to meet their own criteria:
The source code to these programs was obtained through requirement (2):
This code does not specify that it has been signed or has had its authenticity verified. Only code received digitally through requirement (3) is cryptographically verified:
So already at the start of the process, the author is using tools to bootstrap the system which could contain backdoors.
I would change the requirements so that source code printouts are already verified by the person supplying them, or that the solver has to write their own bootstrap tools to get to the point of being able to verify cryptographic hashes/signatures before they can even use any third party source code.