Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If everyone is concerned about commit identity hijacking, you can configure your repo settings to reject any commits which aren't GPG signed.

https://docs.github.com/en/authentication/managing-commit-si...

https://www.devopsauthority.tech/2020/07/18/github-getting-s...



that's great but it requires an active step on behalf of the user which is violating secure defaults principle. it also violates the principle of good UE


There's no way around it, because git commits by default can be forged due to the way it was designed.


Security requirements are often at odds with good UE.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: