| ▲ | semiquaver 3 hours ago | |
I’m sorry, but what is the point of a provenance attestation that can be generated automatically by malware? I would think that any system worth its salt would require strong cryptographic proof tying to some hardware second factor, not just “yep, this was was built on a github actions runner that had access to an ENV key.” It seems like this provenance scheme only works if the bad guys are utterly without creativity. | ||
| ▲ | dboreham 2 hours ago | parent [-] | |
Proper security costs much more. | ||