• 9tr6gyp3@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    3 hours ago

    I think they want to, but Microsoft has made it expensive for open source developers who do this as a hobby and not as a job to sign their software. I know not too long ago, this particular dev was asking its users to install a root certificate on their PC so that they wouldn’t have to deal with Microsofts method of signing software, but that kind of backfired on them.

    • yetAnotherUser@discuss.tchncs.de
      link
      fedilink
      arrow-up
      2
      ·
      1 hour ago

      Yes, but from what I understand this refers to the automatic update functionality and not Microsoft’s own .exe signature verification thing.

      Couldn’t you do it like this:

      • Put hardcoded key into N++
      • If a new release is available: Download, then verify signature
      • If the signatures match, do whatever Windows requires to install an update

      That should work, shouldn’t it?

      • 9tr6gyp3@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        44 minutes ago

        No, because you wouldn’t be able to execute the updated exe without a valid signature. You would essentially brick the install with that method, and probably upset Microsoft’s security software in the process.

    • TeamAssimilation@infosec.pub
      link
      fedilink
      English
      arrow-up
      6
      ·
      3 hours ago

      Let’s Encrypt is a trusted, established alternative, it could replace Microsoft for long-lived software certificates.

      Or tarnish its name associating it with malware and bad actors, who knows?

      • Luminous5481 [they/them]@anarchist.nexus
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 hours ago

        Let’s Encrypt is a trusted, established alternative, it could replace Microsoft for long-lived software certificates.

        Uh, no it could not.

        First of all, the whole point of signing software is to ensure it comes from a reputable source. Let’s Encrypt signs certificates with an automated process that does no verification whatsoever of the identity of the person asking for a certificate. It would make the whole process completely pointless.

        Second, Let’s Encrypt has stated themselves over a decade ago that they have no intention of doing this because it would render the whole system pointless.

        • piccolo@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          2 hours ago

          The point of signing software is to ensure the software was not tampered from the publisher. Linux package managers solve this by comparing a gpg key from the publisher with the software’s. There is no need for a corporate giant to “vet” software.