-
-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sign the EXE files for trust #18028
Comments
|
Ugh this has been mentioned so many times. Let me just find a few existing tickets about it. I even mentioned why it's not signed. It's not trivial, it's expensive to do so (you need a software cert) and it's a tedious process. |
I mentioned a few prices and links in there back then. |
Code signing is indeed becoming more and more important for trust in binary distribution, especially for software installed system-wide with elevated privileges. Cost was an issue for FLOSS software but things have changed since 2014. There is now initiatives to provide code signing to open source project for free, such as SignPath: Vim or Transmission installers are signed this way. |
MSIX packages can be signed for free when published to microsoft store for example https://www.advancedinstaller.com/msix-digital-signing.html |
Close this as a dupe |
Suggestion
Installer EXE files should be properly signed for better trust of the packages on the website.
Use case
Guarantee that the distributed binaries are generated by a trusted party.
Extra info/examples/attachments
The proper instructions are available here.
The text was updated successfully, but these errors were encountered: