On Tue, Feb 04, 2025 at 01:33:48AM -0600, Steve Lewis via cctalk wrote:
Beyond just the compiler, there are also optimization
and other settings
(like the multitude levels of C-compliance or how strict to be about
warnings, or conditional-builds to tailor it specific situations).
Regardless, proper binary deliveries come with CRC checksums. This isn't
Nitpick: Not CRC checksums, as those are only good to detect gross data
corruption (e.g. an entire page/sector being zeroed). The standard these
days is proper cryptographic hashes that are still known to be strong
(e.g. not MD5, as it is known to be weak and collisions can be generated,
but SHA256/SHA512) and the hashes cryptographically signed.
just to verify that you downloaded the file correctly,
but to also help
verify that you've used the exact same "Bill of software material" (SBOM),
versions of dependencies, and other settings to produce that same binary.
Reproducible builds is an issue by itself and requires careful attention
to the build systems. But it should be a base standard.
Kind regards,
Alex.
--
"Opportunity is missed by most people because it is dressed in overalls and
looks like work." -- Thomas A. Edison