Hacker News new | past | comments | ask | show | jobs | submit login

The signature would use asymmetric encryption, so unless the attacker had access to the signing key, it would be impossible for the attacker to sign a modified version of the payload.

EDIT: I see what you mean. radicaldreamer stated that a malicious root certificate is installed, but signature validation wont help there. But, it will help when downloading from mirrors or HTTP.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: