this post was submitted on 23 Jun 2023
57 points (92.5% liked)
Open Source
31031 readers
834 users here now
All about open source! Feel free to ask questions, and share news, and interesting stuff!
Useful Links
- Open Source Initiative
- Free Software Foundation
- Electronic Frontier Foundation
- Software Freedom Conservancy
- It's FOSS
- Android FOSS Apps Megathread
Rules
- Posts must be relevant to the open source ideology
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
- !libre_culture@lemmy.ml
- !libre_software@lemmy.ml
- !libre_hardware@lemmy.ml
- !linux@lemmy.ml
- !technology@lemmy.ml
Community icon from opensource.org, but we are not affiliated with them.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'm not calling you names, I'm calling you out on misinformation. There is such a thing as facts, and it's important that we don't misconstrue them.
Optional signing of commits in git is not the same thing as mandatory signing of all packages.
Fact: If I download software with apt in Debian, It's 100% going to verify the cryptographic authenticity of that package. If the signature doesn't match, it won't proceed with the install (unless I choose to override the warning).
Fact: If I download software with flatpak, it may download maliciously modified software and install it without verifying its authenticity.
I'm not aware of any way to configure flatpak to force it to verify the signature of releases between download & install (so if the signature is unavailable or invalid, it does not install the software). Again, flatpak is not a safe way to download software, and I don't think it's possible to configure it to be safe.
If I'm the one spreading misinformation, then show me the documentation from flatpak that indicates that all packages are verified by their PGP key after download.
I think it's a fairly reasonable expectation that a software repo won't download malicious software. Flatpak doesn't do that.
The first link I sent says that flatpak does not allow users to override GPG and allow unsigned flatpaks unless they are root.
That's not users of flstpak, that's developers. This applies to developers uploading to flstpak. There isnot security for end-users downloading from flatpaks.