it's almost as if the entire notation regarding signed commits as a way of verifying authenticity is just a false premise.
-
@[email protected] I don't remember enabling anything on my 3+ github accounts to show verified commit status. It could have changed in the past couple of years but I remember 5+ years ago it was just the default.
-
@puppygirlhornypost2 thats fair. i just think theres reasonable arguments to be made for signing commits and yet ive only ever seen points against it based on arguments about signing commits that ive never myself seen, so to me it just feels like a strawman but ill take your word on it that people have genuinely made this argument cause its by no means unbelievable!
-
@[email protected] @[email protected] me when i point out that giving access to su is just bad for everyone especially in combination with sudo. oh you want audits for things? sudo su now you can log into another user like ​​ also there's no way of disabling that without prohibiting root access to su so like
-
@[email protected] personally i think signed commits are whatever. i don't particularly care for them nor am i against them. if people want to sign their commits to make things more secure be my guest but this post was mainly made in response to a post i saw where github showed verified commits with expired keys.
-
@puppygirlhornypost2 i checked a repo and a friends unverified commits dont have that label but mine do cause i turned that on for whatever reason at some point, so it seems its a setting
-
@puppygirlhornypost2 @h also
if they have access to the account
they also have access to
to
change the keys used for verification in the profile
they can just add their own keys
and then commit using those
and those commits will be shown as verified anyway -
@[email protected] i just wanted to point out for the most part it doesn't matter. i mean, nothing is fool proof and certainly you may want to sign your commits depending on your threat model (especially since it's relatively easy to change your name and commit as someone else without signatures)
-
@[email protected] @[email protected] imo this is less plausible because typically developers have their keychains verified on third party key servers like MIT. People will notice it's not the usual keychain verifying the commits in that case (hopefully). I'd see it as more suspicious if someone made a new signing key for commits instead of just not signing commits.
-
@[email protected] @[email protected] like the entire point of su for me is to run things as another user i use it for service accounts all the time so it would defeat the point if i suddenly added passwords to my service accounts and had to verify the password through root
-
@puppygirlhornypost2 @h Well ig in the high-tier repos those will be verified so makes sense
Tho like Github doesn't really integrate with third party key servers I think? It just uses keys stored in the profile -
@[email protected] @[email protected] I'm assuming in this case that the people who would notice such discrepancies would also be pulling from MIT or another trusted key server to verify the key is valid. I wouldn't notice this personally (unless someone pointed it out to me) because I don't usually pay attention to signed/unsigned commits