-
Notifications
You must be signed in to change notification settings - Fork 60
Description
Is there an existing request for feature?
- I have searched the existing issues
What feature would you like?
`Hello,
I’m writing as a privacy-focused researcher to raise a concern about a structural supply-chain risk that affects privacy-critical applications distributed through centralized app stores.
To be clear at the outset: I am not alleging malicious intent by any party, nor suggesting that abuse is occurring. This is strictly a threat-model discussion about capability and risk surface, not behavior.
The Issue: Developer Signing Key Custody
When an application’s signing keys are held or managed by a third-party distribution platform, a narrow but serious attack vector becomes possible: selective, targeted delivery of modified binaries to a very small subset of users, while the rest of the user base receives the standard, uncompromised build.
Because such binaries would be:
- correctly signed with the legitimate key
- delivered through the official update channel
- indistinguishable at the OS and store level
they would appear fully authentic to the device and to users.
Practical Limits of Hash Verification
In theory, users could verify binaries via cryptographic hashes. In practice, however:
- the overwhelming majority of users do not verify hashes on every update
- those who do typically compare against the hash provided by the same distribution platform
- independent cross-channel verification (e.g., GitHub vs. store vs. reproducible builds) is extremely rare in real-world usage
This creates a circular trust model where distribution, signing, and hash authority are consolidated. Even without any intent to misuse it, this consolidation weakens the absolute security guarantees expected of privacy-critical software.
Threat Model Implications
The concern is not mass compromise, but precision compromise — a model that modern threat actors and state-level adversaries already prefer.
From a user-trust and threat-model perspective, this leaves projects with a difficult but important choice:
- maintain maximum convenience at the cost of an expanded supply-chain trust boundary, or
- accept distribution inconvenience in order to preserve full cryptographic independence and eliminate this class of risk entirely
I believe users of privacy-focused software deserve transparency about this tradeoff, and projects deserve the opportunity to consciously choose where they stand.
I’m sharing this in good faith because your work matters, and because silent erosion of threat models is far more dangerous than open discussion.
Thank you for your time and for the work you do.
Respectfully,
JMHBM
jmhbm@duck.com
Signal: JMH_BM.01
Session: 05f5bce930e0a18e99d31ca4aba360bd4ef959f9633af0c3476fab674104a03000
`
Anything else?
No response