Conversation

GPG lacks a way to verify a file with a key. It forces usage of the awful keyring and trust model design. The instructions would need to create a temporary keyring to work around that, otherwise it will use other keys in the keyring and users can't be expected to verify output.
1
3
The instructions were also using --recv-keys to avoid needing separate steps for downloading and importing the key. GPG keyrings can apparently be bricked by importing adversarial public keys and public keyservers allow 3rd parties to add malicious data. GPG is obsolete garbage.
1
5
Show replies