Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discuss compromised identities scenarios. #44

Closed
dpc opened this issue Dec 8, 2018 · 0 comments
Closed

Discuss compromised identities scenarios. #44

dpc opened this issue Dec 8, 2018 · 0 comments
Labels
design How should it work

Comments

@dpc
Copy link
Collaborator

dpc commented Dec 8, 2018

People are going to get their machines compromised, and CrevIDs stolen.

My plan was that people should just create a self-Trust Proof with distrust set to non-None and publish that. Any client that finds a Trust Proof like that should immediately distrust the whole CrevId. Maybe even include the Proof like that into their own trust db to publish it for others to see. Only for CrevIDs that they considered trusted before, to prevent spamming.

The rest of the problem should be covered by the fact that the default number of reviews required to consider something a trusted code, should be at least 2. This way one compromised/malicious individual can not compromise anything. For this to happen, the graph/trust algorithm will have to get smarter too and consider only non-overlapping paths, so that people can't create a new CrevId, trust it, and it would now count as another reviewer.

@dpc dpc added the design How should it work label Dec 8, 2018
@dpc dpc changed the title Discuss compromised keys scenarios. Discuss compromised identities scenarios. Dec 8, 2018
@dpc dpc added this to the 0.1 - MVP: cargo-crev/cargo-trust milestone Dec 11, 2018
@dpc dpc closed this as completed Apr 28, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
design How should it work
Projects
None yet
Development

No branches or pull requests

1 participant