Hacker News new | past | comments | ask | show | jobs | submit login

SSL does nothing to guarantee the integrity of code you download and run off the internet.

I'm not worried about MITM attacks, SSL provides adequate protection against those in most cases; but if someone gains access to the coreos systems SSL would not help.

In this case, I have a GPG key saved for the coreos image signing, which hopefully is done offline and I got that through a third party which I have a certain amount of trust on (github), and I can always verify it on other channels.




But did you verify it on other channels? Or did you do like 99.9% of users and assume nobody would be attacking you? My point is mainly that gpg is such a usability nightmare that it's effectively a broken security model.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: