Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A huge part of GPG’s purported use case is getting a signed/encrypted/both blob from somebody and using GPG to confirm it’s authentic. This is true for packages you download and for commits with signatures.

Handling untrusted input is core to that.



It is, and other software handling untrusted data should also treat it as adversarial. For example, your package tool should probably not output raw package metadata to the terminal.


I think you’re missing the forest for the trees.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: