• yetAnotherUser@discuss.tchncs.de
    link
    fedilink
    arrow-up
    8
    ·
    5 hours ago

    It’s astounding this wasn’t done years sooner to be honest. I mean, signing software with keys is not something invented recently. Not doing so is akin to storing passwords in plain text.

    • 9tr6gyp3@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      3 hours ago

      I think they want to, but Microsoft has made it expensive for open source developers who do this as a hobby and not as a job to sign their software. I know not too long ago, this particular dev was asking its users to install a root certificate on their PC so that they wouldn’t have to deal with Microsofts method of signing software, but that kind of backfired on them.

      • yetAnotherUser@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        ·
        1 hour ago

        Yes, but from what I understand this refers to the automatic update functionality and not Microsoft’s own .exe signature verification thing.

        Couldn’t you do it like this:

        • Put hardcoded key into N++
        • If a new release is available: Download, then verify signature
        • If the signatures match, do whatever Windows requires to install an update

        That should work, shouldn’t it?

        • 9tr6gyp3@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          44 minutes ago

          No, because you wouldn’t be able to execute the updated exe without a valid signature. You would essentially brick the install with that method, and probably upset Microsoft’s security software in the process.

      • TeamAssimilation@infosec.pub
        link
        fedilink
        English
        arrow-up
        6
        ·
        3 hours ago

        Let’s Encrypt is a trusted, established alternative, it could replace Microsoft for long-lived software certificates.

        Or tarnish its name associating it with malware and bad actors, who knows?

        • Luminous5481 [they/them]@anarchist.nexus
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 hours ago

          Let’s Encrypt is a trusted, established alternative, it could replace Microsoft for long-lived software certificates.

          Uh, no it could not.

          First of all, the whole point of signing software is to ensure it comes from a reputable source. Let’s Encrypt signs certificates with an automated process that does no verification whatsoever of the identity of the person asking for a certificate. It would make the whole process completely pointless.

          Second, Let’s Encrypt has stated themselves over a decade ago that they have no intention of doing this because it would render the whole system pointless.

          • piccolo@sh.itjust.works
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            2 hours ago

            The point of signing software is to ensure the software was not tampered from the publisher. Linux package managers solve this by comparing a gpg key from the publisher with the software’s. There is no need for a corporate giant to “vet” software.

    • sus@programming.dev
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      3 hours ago

      Cryptography is hard and programmers are notoriously really really really bad at it.