We trust Github, Cloudflare and many big Tech server hosts with access to the PGP keys that sign critical software.

It is important to have verification backups of those keys on multiple channels.

This is an additional one.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    Not sure I follow your logic. If a signing key is compromised, it doesn’t matter if you have a backup of the signing key, payloads that are signed with the compromised key still look genuine because they have the right key.

    If you’re worried about third party services abusing signing keys, you should look into reproducible builds instead.

  • brie@beehaw.org
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    If I understand correctly, the idea is to cross-reference with the listed PGP keys to validate they haven’t been changed (implicitly by an adversary)? This essentially sounds like what you’re supposed to do with PGP anyway: keep the key so you can detect replacement of the key. The main difference is for someone who doesn’t already have the key, they can cross reference it with the directory (essentially like a Wayback Machine for PGP keys).