157
you are viewing a single comment's thread
view the rest of the comments
[-] Kazumara@discuss.tchncs.de 8 points 1 week ago

Best to do both, really, so a record of using a consistent public key is created.

Then supply chain attacks might be noticed. If someone manages to replace the file on the webserver but can't get to the signing key you've prevented the attack.

this post was submitted on 02 Jun 2025
157 points (100.0% liked)

Linux

7853 readers
243 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS