▲ | jwgarber 2 days ago | |||||||
This article goes into some of the deficiencies of using GPG with pass. In particular, GPG uses asymmetric keys, so someone could encrypt a new password file with your public key and you wouldn't know. | ||||||||
▲ | upofadown 2 days ago | parent | next [-] | |||||||
Yes, that is specifically what enabling signatures prevents. You would know when the stored password stopped working and the content of the rest of the file changed. That article is fairly rough. For one thing it references "The PGP Problem": * https://articles.59.ca/doku.php?id=pgpfan:tpp For another thing it references "the quantum threat against cryptography" as an actual argument against password store. | ||||||||
| ||||||||
▲ | wkat4242 2 days ago | parent | prev [-] | |||||||
Well yes but this is also a feature: you can store passwords without having the private key available. That can be handy. I don't really see the value in an attacker being able to store new passwords anyway. Besides, in order to do that they'd already have to have breached my private git server too. |