-
Notifications
You must be signed in to change notification settings - Fork 373
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sha256 sums for downloads #243
Comments
I'm working on new auto build server and when finished I'll add GPG signature there. |
The auto update does not show me the build process. It may be a signed binary, but who knows how that binary was built or if your server was hacked? I'd like to see the build logs off the CI server, which is a bit harder to fake. |
Yes, all binaries are signed. |
Ok! That is one way to do it. =) |
I really don't trust downloading a binary from sourceforge and not having sha256 sums for it as well.
Can you please figure out a more secure method of distributing the binaries?
One way would be to use a CI server to build the binary and have it upload the artifact to the github releases page. As part of the build, it could also upload the sha256 hash as a file to the releases page as well.
This would also automate the releases much more so that you could have it do this every time you tagged a new version in git.
This is super easy (and free and transparent) to automate with travis. https://docs.travis-ci.com/user/deployment/releases
The text was updated successfully, but these errors were encountered: