Hacker News new | past | comments | ask | show | jobs | submit login

It helps that Signal uses an HTTPS apt repo and includes "signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg" in the apt list entry. If their download server were compromised, (and assuming the hacker didn't also get the private gpg key) the attacker would have to provide malicious archives selectively to avoid detection. Anyone who installed the old key (e.g., me) would notice the key validation errors.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: