Hacker News new | past | comments | ask | show | jobs | submit login

No, it's not, and it's side effects, making cryptographic verification of your system state and installed programs impossible, make it not even worth discussing.



Verify the sources’ hash and randomize locally. Even better, distribute some intermediate format which is mostly compiled, but reproducible and locally randomize that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: