Hi,

On Thu, Apr 10, 2014 at 01:50:27PM +0200, David Sommerseth wrote:
> Samuli: Maybe our release announcements should be PGP signed, with
> sha256sums of the files we're releasing?  And maybe we should consider
> a possibility to host at least a copy of the PGP signatures of our
> files on an external server too?  (That should *not* be a mirrored
> setup, but somehow distributed outside of a public HTTP{,S})
> 
> <paranoid mode="off"/>

Well, since this is PGP/GPG, we could just use the power of the Web-of-Trust
and have all the active developers sign the release key - that way it
doesn't matter where the key can be found, it has signatures to prove
that "yes, this is the key Gert and David signed".

Now, whether you should trust *me* is a different matter :-)

gert
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgpNTajwnAslC.pgp
Description: PGP signature

------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to