Skip to content

Supply-Chain Risk: App Signing Key Custody & Targeted Update Threat Model #1880

@JMHBM

Description

@JMHBM

Is there an existing request for feature?

  • I have searched the existing issues

What feature would you like?

`Hello,

I’m writing as a privacy-focused researcher to raise a concern about a structural supply-chain risk that affects privacy-critical applications distributed through centralized app stores.

To be clear at the outset: I am not alleging malicious intent by any party, nor suggesting that abuse is occurring. This is strictly a threat-model discussion about capability and risk surface, not behavior.

The Issue: Developer Signing Key Custody

When an application’s signing keys are held or managed by a third-party distribution platform, a narrow but serious attack vector becomes possible: selective, targeted delivery of modified binaries to a very small subset of users, while the rest of the user base receives the standard, uncompromised build.

Because such binaries would be:

  • correctly signed with the legitimate key
  • delivered through the official update channel
  • indistinguishable at the OS and store level

they would appear fully authentic to the device and to users.

Practical Limits of Hash Verification

In theory, users could verify binaries via cryptographic hashes. In practice, however:

  • the overwhelming majority of users do not verify hashes on every update
  • those who do typically compare against the hash provided by the same distribution platform
  • independent cross-channel verification (e.g., GitHub vs. store vs. reproducible builds) is extremely rare in real-world usage

This creates a circular trust model where distribution, signing, and hash authority are consolidated. Even without any intent to misuse it, this consolidation weakens the absolute security guarantees expected of privacy-critical software.

Threat Model Implications

The concern is not mass compromise, but precision compromise — a model that modern threat actors and state-level adversaries already prefer.

From a user-trust and threat-model perspective, this leaves projects with a difficult but important choice:

  • maintain maximum convenience at the cost of an expanded supply-chain trust boundary, or
  • accept distribution inconvenience in order to preserve full cryptographic independence and eliminate this class of risk entirely

I believe users of privacy-focused software deserve transparency about this tradeoff, and projects deserve the opportunity to consciously choose where they stand.

I’m sharing this in good faith because your work matters, and because silent erosion of threat models is far more dangerous than open discussion.

Thank you for your time and for the work you do.

Respectfully,

JMHBM
jmhbm@duck.com
Signal: JMH_BM.01
Session: 05f5bce930e0a18e99d31ca4aba360bd4ef959f9633af0c3476fab674104a03000
`

Anything else?

No response

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions