Conversation

Replying to and
It's overly complex with far too much attack surface and has egregiously bad usability and security. It's only suitable for usage as a case study in how not to design and implement software. Rather than changing the instructions to work around GPG deficiencies, it won't be used.
1
4
The instructions were also using --recv-keys to avoid needing separate steps for downloading and importing the key. GPG keyrings can apparently be bricked by importing adversarial public keys and public keyservers allow 3rd parties to add malicious data. GPG is obsolete garbage.
1
5
The attitude of the people designing and developing it is also unacceptable. They redirect the blame for their failures towards users and attackers. They're lucky the attacker in this recent case was seemingly just trying to prove a point about there being a serious flaw in GPG.
2
3
Show replies