mirror of
https://github.com/qbittorrent/qBittorrent.git
synced 2026-03-02 22:57:32 -05:00
Sign the EXE files for trust #13982
Labels
No labels
Accessibility
AppImage
Bounty
Build system
CI
Can't reproduce
Code cleanup
Confirmed bug
Confirmed bug
Core
Crash
Data loss
Discussion
Docker
Documentation
Duplicate
Feature
Feature request
Feature request
Feature request
Filters
Flatpak
GUI
Has workaround
I2P
Invalid
Libtorrent
Look and feel
Meta
NSIS
Network
Not an issue
OS: *BSD
OS: Linux
OS: Windows
OS: macOS
PPA
Performance
Project management
Proxy/VPN
Qt bugs
Qt6 compat
RSS
Search engine
Security
Temp folder
Themes
Translations
Triggers
Waiting diagnosis
Waiting info
Waiting upstream
Waiting web implementation
Watched folders
WebAPI
WebUI
autoCloseOldIssue
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/qBittorrent#13982
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @clicktodev on GitHub (Nov 17, 2022).
Suggestion
Installer EXE files should be properly signed for better trust of the packages on the website.
Use case
Guarantee that the distributed binaries are generated by a trusted party.
Extra info/examples/attachments
The proper instructions are available here.
@stalkerok commented on GitHub (Nov 17, 2022):
https://github.com/qbittorrent/qBittorrent/issues/18022#issuecomment-1315056483
@Balls0fSteel commented on GitHub (Nov 17, 2022):
Ugh this has been mentioned so many times. Let me just find a few existing tickets about it. I even mentioned why it's not signed. It's not trivial, it's expensive to do so (you need a software cert) and it's a tedious process.
@Balls0fSteel commented on GitHub (Nov 17, 2022):
https://github.com/qbittorrent/qBittorrent/issues/1376
I mentioned a few prices and links in there back then.
@c0bw3b commented on GitHub (Feb 19, 2023):
Code signing is indeed becoming more and more important for trust in binary distribution, especially for software installed system-wide with elevated privileges.
Cost was an issue for FLOSS software but things have changed since 2014. There is now initiatives to provide code signing to open source project for free, such as SignPath:
Vim or Transmission installers are signed this way.
@soredake commented on GitHub (May 10, 2023):
MSIX packages can be signed for free when published to microsoft store for example https://www.advancedinstaller.com/msix-digital-signing.html
@luzpaz commented on GitHub (May 14, 2023):
Close this as a dupe
@long76 commented on GitHub (Feb 21, 2025):
upvote this. maybe dup #17243
@long76 commented on GitHub (Feb 21, 2025):
ping @Chocobo1 @sledgehammer999 @glassez