this post was submitted on 02 Jun 2025
150 points (96.9% liked)

Linux

8191 readers
198 users here now

A community for everything relating to the GNU/Linux operating system

Also check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Limonene@lemmy.world 43 points 1 month ago (9 children)

Article doesn't mention my biggest problem with flatpaks, that the packages are not digitally signed. All major Linux distros sign their packages, and flathub should too. I would prefer to see digital signatures from both flathub and the package's maintainer. I don't believe flathub has either one currently.

[–] FizzyOrange@programming.dev 10 points 1 month ago (7 children)

What would they sign it with? How do you verify the signature?

[–] Limonene@lemmy.world 6 points 1 month ago* (last edited 1 month ago) (2 children)

Mozilla, for example, would sign Firefox's flatpak with a PGP key that they would disclose on their website. You verify the signature using the RSA algorithm (or any other algorithm for digital signatures. There are a bunch.) Or, you could just trust that your connection wasn't tampered the first time, then you would have the public key, and it would verify each time that the package came from that same person. Currently, you have to trust every time that your connection isn't tampered.

Major flatpak providers (Flathub at the very least) would include their PGP public key in the flatpak software repo, and operating system vendors would distribute that key in the flatpak infrastructure for their operating system, which itself is signed by the operating system's key.

[–] FizzyOrange@programming.dev 8 points 1 month ago (1 children)

that they would disclose on their website

Wouldn't it make more sense then for them to simply host the Flatpak themselves? I kind of thought that was the whole idea of Flatpak.

[–] Kazumara@discuss.tchncs.de 7 points 1 month ago

Best to do both, really, so a record of using a consistent public key is created.

Then supply chain attacks might be noticed. If someone manages to replace the file on the webserver but can't get to the signing key you've prevented the attack.

load more comments (4 replies)
load more comments (5 replies)