17:45:26 -xmr-pr- xiphon opened pull request #2963: cmake: fix x11 linking 17:45:27 -xmr-pr- > https://github.com/monero-project/monero-gui/pull/2963 18:49:14 .merge+ 2963 18:49:18 .merge+ #2963 18:49:19 Added 18:49:22 .merges 18:49:22 -xmr-pr- #2933 #2937 #2947 #2950 #2959 #2961 #2962 #2963 21:11:26 is there such a thing as immutable git? no "force push and backdating PRs/commits"? 21:14:23 Assuming SHA1 can not be pwned (or you use a post-SHA1 git repo), then you can't alter history without the commit hashes changing. 21:14:50 Assuming SHA1 can not be pwned is not quite sane at this moment. 21:16:58 kinghat[m]: what do you mean by "immutable"? 21:17:17 a force-push is a new branch of the commit graph 21:17:22 That which can be immuted. Obviously. 21:17:24 there's no way to prevent this, but it's detectable 21:17:33 (assuming no hash collisions...) 21:18:02 a repo host (like github) could always prevent this by its own policy 21:18:42 So I suppose it's "sort of" preventable =p 21:18:59 It's preventable by a repo host, but not inherently by the way git operates, is what I mean 21:20:12 we were talking about the hash checking on the gui updater in here on the 11th 21:20:38 fluffy was saying its not hard to change git history. 21:21:07 It's hard to change it without affecting the hash 21:21:36 It's very hard to change it if the commits are signed 21:21:45 What are you looking to do? 21:22:59 i was just wondering if it would be better to check the hash from two locations instead of a single source. 21:23:37 but selsta already mention that it was probably overkill the way it is and would be giving gh data about users checking the hash iirc 21:23:41 The hash of what? 21:24:03 the binary iirc 21:24:12 That has nothing to do with git 21:26:13 * kinghat[m] sent a long message: < https://matrix.org/_matrix/media/r0/download/matrix.org/KGWUGwajDlTCGEcEJcYJNOjQ > 21:26:53 i then asked if there would be a public trace of the compromise. and thats where the backdating of a pr/commit came into context. 21:26:59 Compromise of what? 21:27:05 The binary or the git repo? 21:27:08 Or both? 21:27:13 a dev 21:27:29 Well, you're checking for two sigs from maintainers already, right? 21:27:40 dev > repo > binary 21:27:41 That does not make sense because if you have server access you can change a file, there would be no trace on github. 21:28:16 If you mean the auto updater specifically, you would see which maintainer signed the bad hashes. 21:30:10 ya but you would have to compromise the monero server and github 21:31:52 If someone compromises 3 DNS servers, the website and two maintainer signatures then there is no reason to believe that they couldn’t get into the Github of a maintainer. 21:36:37 true 21:36:48 I consider GPG sig compromised = fully compromised 21:36:54 something something repo builds 😂 21:37:58 soon^tm :D