You're right, but here's the problem: on the Internet, everyone is an Alice. It's not an Alice and Bob situation where they can engage in some trade-craft and exchange their public key fingerprints during a dinner date because they know each other.
If we drop the keyserver access requirement, what's to stop an evil mirror from creating a key pair in the name of the module developer and signing an evil module just for you?
In reply to Re: cpan/cpanm integrity and authenticy checks concerns
by Anonymous Monk
in thread cpan/cpanm integrity and authenticy checks concerns
by hrcerq
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |