Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
0 points
hashstring
4mo ago
0 comments
Share
They can, but what does it solve? If a malicious package gets pushed, who or what is the equivalent of the CA that you are you going to nuke?
undefined | Better HN
0 comments
default
newest
oldest
rishabhaiover
4mo ago
I was working with the assumption in this model the attestation is signed by ephemeral keys (OIDC) which would reveal the bad actor or give breadcrumbs. Enough to reduce incentives to hijack packages.
j
/
k
navigate · click thread line to collapse