Post the SHA256 hashes of every release and downloadable version!
That or PGP signatures
<3
Suggestions: post official SHA256 signatures of each release
Suggestions: post official SHA256 signatures of each release
Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.0
Re: Suggestions: post official SHA256 signatures of each rel
No objection here, although I'd go with SHA. Lightweight freeware is available to match signatures of hash algorithms, but IDK if access to PGP is that easy for those who aren't already using it for encrypted e-mail. If there are free, standalone apps that can check PGP sigs, equally light (HashCalc is 1 MB and can be run directly from a flash drive, no install required), do let us know.
On updates, would you be looking at the .xpi in the Temp directory before restarting, and running it through (whatever) to compare sigs before the restart?
It should be helpful that both the original install and all updates are delivered from HTTPS sites by HTTPS connections, but being a tinfoil-hatter myself, you can't be too cautious.
On updates, would you be looking at the .xpi in the Temp directory before restarting, and running it through (whatever) to compare sigs before the restart?
It should be helpful that both the original install and all updates are delivered from HTTPS sites by HTTPS connections, but being a tinfoil-hatter myself, you can't be too cautious.

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28
Re: Suggestions: post official SHA256 signatures of each rel
Synchronize watches:
latest development build 2.3.7rc3 = a8eeaeabd1932a25d5dc0a2e55c44140c37286f5e86be5c8a1ea24627992a43c
SHA-512 = 3a46834ad5cc674f4fc46e86596e94b84d09bb2bc44b3c81c09c902ad2fcd339edda754065aab5e911ac815b0386e3d287f7edc24eb787d4ebc79f6f879084a7
Latest stable release 2.3.6 = c9cba045269cfda1b3406ff8a51095127d3583aaf2f8ee52a3dca918f63abab5
SHA-512 = b17ffdfd2feabe26c97b852f9b627f8039f6a7438988d1e82707f6727262a87951b3ef462b77c9573d8c54b0983b1e2e01d244062867352f5804ad672a3ed8e3
Check?
latest development build 2.3.7rc3 = a8eeaeabd1932a25d5dc0a2e55c44140c37286f5e86be5c8a1ea24627992a43c
SHA-512 = 3a46834ad5cc674f4fc46e86596e94b84d09bb2bc44b3c81c09c902ad2fcd339edda754065aab5e911ac815b0386e3d287f7edc24eb787d4ebc79f6f879084a7
Latest stable release 2.3.6 = c9cba045269cfda1b3406ff8a51095127d3583aaf2f8ee52a3dca918f63abab5
SHA-512 = b17ffdfd2feabe26c97b852f9b627f8039f6a7438988d1e82707f6727262a87951b3ef462b77c9573d8c54b0983b1e2e01d244062867352f5804ad672a3ed8e3
Check?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28
Re: Suggestions: post official SHA256 signatures of each rel
This should be maintained in the front page and perhaps have a script to a hash application collect the .xpi SHA256 and posts the text string to the website. To be trusted if posted by the official core developer/compiler himself.
Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.0
Re: Suggestions: post official SHA256 signatures of each rel
How would you know if you can trust the hashes you see?
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20100101 Firefox/11.0
Re: Suggestions: post official SHA256 signatures of each rel
If served by HTTPS and posted on the official Noscript website by the administrator...dhouwn wrote:How would you know if you can trust the hashes you see?
Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.0
Re: Suggestions: post official SHA256 signatures of each rel
This has always been my concern with sites that give SHA, or even MD5 (dhouwn wrote:How would you know if you can trust the hashes you see?

E. g., PortableApps.com. I love those guys, but since the checksum/hash is on an insecure page, how do I know that someone hasn't tampered with the d/l, hashed it, then tampered with the page to make the new hash match the tampered d/l?
Agree that the best way is to put it on an HTTPS page -- which this entire forum is NOT.
However, Giorgio already has a secure sub-domain, https://secure.informaction.com/* , used to serve the latest development build, and as a direct d/l for stable releases (to supplement the also-secure AMO link.)
So there shouldn't be much more overhead in adding one more page there, with checksums for each stable/dev build.
The Question Is: How many users would actually make use of this, before we ask Giorgio to go to this additional trouble?
Responses, please, whether you *seriously* would use this. And if you wouldn't, that's of interest too.
p. s.: @ Suggestions: Did you get the same SHA hashes I did?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28
Re: Suggestions: post official SHA256 signatures of each rel
Generating SHA256 sums with some scripts and let cron jobs take care of it on a daily basis should be easy.Tom T. wrote:dhouwn wrote:before we ask Giorgio to go to this additional trouble?
I strongly support HTTPS and stronger hash signatures.
There should be a PGP key too.
Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.0
Re: Suggestions: post official SHA256 signatures of each rel
It shouldn't be daily; it needs to be in real time as the update or whatever is released; else to those who rely on the hash, the update is useless until the hash is posted.JohnB wrote:Generating SHA256 sums with some scripts and let cron jobs take care of it on a daily basis should be easy.Tom T. wrote:...before we ask Giorgio to go to this additional trouble?
There is also an additional expense for bandwidth, depending on how many users access the hash page. Please keep in mind that Giorgio is bearing the entire cost of hosting this site separately, as opposed to its original location as a *single topic* at Mozilla forum. Donations and the ads at the NS home page have to cover this, and how many people do donate?
Thanks for the support comment on hashes. IMHO only, PGP is duplicative. As mentioned, anyone can get a free hash calculator that requires no install. Installing PGP isn't so simple. If you don't trust the hash, why trust the PGP? Again, IMHO. Thanks for reply.I strongly support HTTPS and stronger hash signatures.
There should be a PGP key too.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28