this post was submitted on 02 Jun 2025
158 points (97.0% liked)

Linux

7654 readers
278 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of [email protected] and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 4 days ago

Best to do both, really, so a record of using a consistent public key is created.

Then supply chain attacks might be noticed. If someone manages to replace the file on the webserver but can't get to the signing key you've prevented the attack.