Skip to content

Commit 503e5c5

Browse files
authored
Update 2025-04-02-add bullets
1 parent 8c1c3ff commit 503e5c5

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

_posts/2025-04-02-open-integrity.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -36,19 +36,19 @@ Beyond that, Open Integrity's root of trust can also be used as a DID (decentral
3636

3737
The foundation of trust in Git is signing commits with a signing key that is registered with a Git account, but that turns out to be a fragile level of trust because it leaves a number of loopholes.
3838

39-
___Signing isn't required.___ Even if an account has a legitimate signing key, use of that key isn't required. Even if a Git hosting service enforces commit signing, unsigned commits can typically still be merged from branches.
39+
* ___Signing isn't required.___ Even if an account has a legitimate signing key, use of that key isn't required. Even if a Git hosting service enforces commit signing, unsigned commits can typically still be merged from branches.
4040

41-
___Merging doesn't guarantee signatures.___ Generally, merging offers one of the biggest gaps in signing security. It's not just that merged commits can be unsigned, but that a branch can be deleted after merging, leaving no trace as to whether its commits were signed or not.
41+
* ___Merging doesn't guarantee signatures.___ Generally, merging offers one of the biggest gaps in signing security. It's not just that merged commits can be unsigned, but that a branch can be deleted after merging, leaving no trace as to whether its commits were signed or not.
4242

4343
Things don't necessarily get better when signing actually occurs.
4444

45-
___Repo origin can't be verified.___ Though you can verify signed commits belong to the person who currently controls a repo, there's no way to verify that they haven't illegitimately taken over the repo since its inception.
45+
* ___Repo origin can't be verified.___ Though you can verify signed commits belong to the person who currently controls a repo, there's no way to verify that they haven't illegitimately taken over the repo since its inception.
4646

47-
___Chain of trust functionality is non-existant.___ On the flipside, there's no way to show a legitimate transfer of authority between a repo's originator and its current controller.
47+
* ___Chain of trust functionality is non-existant.___ On the flipside, there's no way to show a legitimate transfer of authority between a repo's originator and its current controller.
4848

49-
___Key revocation is weak.___ Though keys can be manually revoked, there's no way to automatically do so, and there are no warnings if a revoked key was used for signing.
49+
* ___Key revocation is weak.___ Though keys can be manually revoked, there's no way to automatically do so, and there are no warnings if a revoked key was used for signing.
5050

51-
___History can be rewritten.___ Finally, Git includes a [purposeful tool](https://git-scm.com/book/en/v2/Git-Tools-Rewriting-History) to allow you to rewrite commit history: editing commit messages, rebasing at a large scale, and even removing or changing files! This will change SHA-1 checksums, but as with other dangers here, there's inadequate messaging to warn of this issue.
51+
* ___History can be rewritten.___ Finally, Git includes a [purposeful tool](https://git-scm.com/book/en/v2/Git-Tools-Rewriting-History) to allow you to rewrite commit history: editing commit messages, rebasing at a large scale, and even removing or changing files! This will change SHA-1 checksums, but as with other dangers here, there's inadequate messaging to warn of this issue.
5252

5353
## Solving the Problems
5454

0 commit comments

Comments
 (0)