That’s it. Would you recommended any other repository?

  • Moonrise2473
    link
    fedilink
    arrow-up
    2
    ·
    3 months ago

    For a crypto wallet it seems extremely dangerous to use a custom repo. What if one day it pushes an hacked version with the same signature and it takes all the money?

    For this use case I’d consider only from fdroid, the only way it can be sure it matches the published source code

    • shortwavesurfer@monero.town
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 months ago

      Those repos are maintained by the developers of the Monero wallet. So, if they were going to do that, they would also be able to push the malware version to the fdroid repo as well, because the signatures would match the developers.

      • Moonrise2473
        link
        fedilink
        arrow-up
        2
        ·
        3 months ago

        The fdroid repository has only apps built by fdroid itself using the published source code, while a private repo could have a binary that doesn’t match the source.

        It might be a financial incentive for someone to hack the dev, steal their signing keys, silently add a timebomb that at a specific time would send the whole content of the wallet to a specific monero address, replace the apk after a new release is added. Nobody would notice until too late

        Difficult hack but not impossible

        • shortwavesurfer@monero.town
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          3 months ago

          That is a fair point. The protection of the main fdroid repo is that they build it from source and then compare the binaries to make sure they match if i understand reproduceable builds correctly.

          Edit: But if a hacker hacked the developer, wouldn’t they just change the source code as well so that they still match? Like if I wanted to hack Monerujo id want to get the git repo if possible along with the repo keys so i could push malicious code to the git repo, build a binary from that malicious code, publish it on the devs fdroid repo and then when fdroid compares the binary to source they match even though they are malicious.