For example, if 5 devs submit signatures for their locally built programs/libraries, then a github build system cannot be corrupted or produce unexpected results because none of the signatures would match.

So now an attacker would need to corrupt 5 dev computers or the public source repository (and remain undiscovered), because corrupting one dev is no guarantee.

Reply to this note

Please Login to reply.

Discussion

No replies yet.