Hi there,
I am using wxWidgets for multiplatform development of the elliptic curve cryptography tool "Academic Signature".
(->find Academic Signature e.g. via google > open source elliptic curve cryptography <
or directly here:
http://www.fh-wedel.de/~an/crypto/Acade ... e_eng.html)
Since the summer of Snowden, we know that at least US-intelligence and probably UK, russian, chinese, whatever as well are able and willing to intercept internet traffic and redirect it to plant backdoors. See what they did to TOR/firefox and how they took advanteage of a race condition here:
http://www.theguardian.com/world/2013/o ... -anonymity
In developing security software, I always have to look for the weakest link. Presently the weakest link in my case is the lack of any protection of the wxWidgets downloads en route to me(or other users if they do not use my statical link of wxWidgets). I understand your server is situated in the UK, so even if I download via TOR, the exit node communicates with your server is in the plain. GCHQ could manipulate the traffic and give me crab lice. They do this kind of thing and even seem to be proud of it! Google "royal concierge".
I would greatly appreciate it, if at least the source archives were protected by a digital signature of the developer in charge of the releases. In this way the notorious agencies would at least have to introduce a mole into the wxWidgets team. Without signatures that they get the chance to circulate backdoored versions almost for free. In fact they are able to compromise any system that uses wxWidgets supported programs.
If I were working for the NSA and were to attack Linux users, wxWidgets would be one of my primte targets. I cannot imagine any Linux not using any wxWidgats based tool. And I would get a free ride for additional backdoors in Windows and Apple os. The wxWidgets team should be aware of being a very attractive target for these people.
So please think of authenticating your downloads e.g with GnuPG (you might also use a more modern authentication scheme using Academic Signature of course :-).
regards
Michael Anders