Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do Not trust verify #236

Open
fbrz76 opened this issue Aug 12, 2023 · 5 comments
Open

Do Not trust verify #236

fbrz76 opened this issue Aug 12, 2023 · 5 comments
Labels
feature request New feature or request

Comments

@fbrz76
Copy link

fbrz76 commented Aug 12, 2023

Pls,
to avoid using bad source code, how to verify downloaded source code to build is that released?

@anipaul2
Copy link
Contributor

Pls, to avoid using bad source code, how to verify downloaded source code to build is that released?

Could you please elaborate on what you are trying to achieve? This will help me guide you more effectively.

@fbrz76
Copy link
Author

fbrz76 commented Aug 13, 2023

Sure, i refer to something like that:
https://raspibolt.org/guide/bitcoin/electrum-server.html#build-from-source-code
In second section when about to verify the signature.

@orbitalturtle
Copy link
Contributor

I agree, this would be a really nice feature to have :)

@sr-gi sr-gi added the feature request New feature or request label Aug 24, 2023
@sr-gi
Copy link
Member

sr-gi commented Oct 24, 2023

some additional reference I found in GitHub to sign a commit:

https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits

https://docs.github.com/en/authentication/managing-commit-signature-verification/about-commit-signature-verification

All commits need to be signed in order for PR to be merged in the repo. I think what the OP refers to is for the releases to be signed so we don't have to trust GH

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature request New feature or request
Projects
None yet
Development

No branches or pull requests

5 participants