• Kazumara@discuss.tchncs.de
    link
    fedilink
    arrow-up
    7
    ·
    4 days ago

    Best to do both, really, so a record of using a consistent public key is created.

    Then supply chain attacks might be noticed. If someone manages to replace the file on the webserver but can’t get to the signing key you’ve prevented the attack.