Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The certificate specifically demonstrates that the <release-manager>@python.org identity signed the artifact.

So there's a) no long-lived private key for them to lose (because it's never stored after signing) and b) a consumer doesn't need to find the right key PGP ID, verify (somehow) that that key ID is associated with a given release manager -- they can just trust that the release manager is in control of their @python.org identity.

Additionally, with PGP, you have no idea if your private key is being used somewhere else to generate valid signatures maliciously. With Sigstore, in order for the signature to be valid, it must be published in a transparency log, which is continuously monitored. So in the event of if the key/identity is compromised, the identity owner can be made aware immediately and the signature revoked.

More details are here: https://www.python.org/download/sigstore/ and here: https://docs.sigstore.dev/



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: