logoalt Hacker News

akerl_yesterday at 7:36 PM1 replyview on HN

A huge part of GPG’s purported use case is getting a signed/encrypted/both blob from somebody and using GPG to confirm it’s authentic. This is true for packages you download and for commits with signatures.

Handling untrusted input is core to that.


Replies

xorcistyesterday at 7:42 PM

It is, and other software handling untrusted data should also treat it as adversarial. For example, your package tool should probably not output raw package metadata to the terminal.

show 1 reply