Saturday, May 9, 2026
The BLOCKCHAIN Page
No Result
View All Result
  • Home
  • Cryptocurrency
  • Blockchain
  • Bitcoin
  • Market & Analysis
  • Altcoins
  • DeFi
  • Ethereum
  • Dogecoin
  • XRP
  • Regulations
  • NFTs
The BLOCKCHAIN Page
No Result
View All Result
Home NFTs & Metaverse

Linux explores new way of authenticating developers and their code – here’s how it works

by admin
February 26, 2026
in NFTs & Metaverse
0
Linux explores new way of authenticating developers and their code – here’s how it works
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter


akeydiggettyimages-1446187273

Yuichiro Chino/Second through Getty Photographs

Observe ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • The Linux kernel is transferring towards a greater approach of figuring out builders and their code.
  • This new method can be utilized by different open-source tasks.
  • It is not being rolled out but, however I anticipate it to be deployed by this time subsequent yr.

NAPA, Calif. — Within the immortal phrases of music developer Pete Townshend, “Effectively, who’re you? (Who’re you? Who, who, who, who?) I actually wanna know!” Linux kernel maintainers have the identical query: Who’re their programmers, and the way can the kernel neighborhood ensure the code they submit is basically theirs? 

For many years, Linux kernel builders used Pretty Good Privacy (PGP) to determine builders and their launch artifacts. Git’s PGP integration enabled signed tags to verify code repository integrity and signed commits to forestall hackers from impersonating respectable builders. 

Additionally: The latest Linux kernel release closes out the 6.x era – and it’s a gift to cloud admins

In 2011, hackers efficiently cracked the principle Linux improvement web site, kernel.org. Afterward, to verify this did not occur once more, the kernel’s PGP internet of belief was explicitly “bootstrapped” at a face-to-face key‑signing session through the 2011 Kernel Summit.

Extra not too long ago, the xz utility was compromised by a malicious developer, virtually resulting in malware infecting Linux. 

A painful course of

At present, kernel maintainers who desire a kernel.org account should discover somebody already within the PGP internet of belief, meet them face‑to‑face, present authorities ID, and get their key signed. The method is sort of a guide, international scavenger hunt. Linux kernel maintainer Greg Kroah-Hartman, talking on the Linux Basis Members Summit, described it as a “ache to do and handle.” That is as a result of it is tracked by guide scripts, the keys drift old-fashioned, and the general public “who lives the place” map creates privateness and social‑engineering threat. 

Subsequently, the kernel maintainers are working to exchange this fragile PGP key‑signing internet of belief with a decentralized, privateness‑preserving id layer that may vouch for each builders and the code they signal.

 Additionally: This backdoor almost infected Linux everywhere: The XZ Utils close call

Their new method, which I will name Linux ID, was introduced this week by Linux Foundation Decentralized Trust leaders Daniela Barbosa and Hart Montgomery, together with associate Glenn Gore, CEO of Affinidi, an open-standard digital belief firm. Linux ID is supposed to present the kernel neighborhood a extra versatile option to show who individuals are, and who they don’t seem to be, with out falling again on brittle key‑signing events or advert‑hoc video calls. 

On the core of Linux ID is a set of cryptographic “proofs of personhood” constructed on fashionable digital id requirements slightly than conventional PGP key signing. As an alternative of a single monolithic internet of belief, the system points and exchanges personhood credentials and verifiable credentials that assert issues like “this individual is an actual particular person,” “this individual is employed by firm X,” or “this Linux maintainer has met this individual and acknowledged them as a kernel maintainer.”

Issuer‑agnostic and composable 

These credentials might be anchored in a number of methods: Authorities-issued digital IDs, the place out there; third‑social gathering id verifiers much like visa software facilities; employers; or the Linux Basis itself performing as an issuer. 

Montgomery harassed that the mannequin is deliberately issuer‑agnostic and composable: if two builders share belief in several issuers, they’ll nonetheless discover overlapping belief paths, and the extra impartial issuers exist, the stronger the general system turns into.

Additionally: I’ve used Windows for decades, but I tried Linux to see if it’s truly ‘easy’ now – and one thing surprised me

Technically, Linux ID is constructed round decentralized identifiers (DIDs). This can be a W3C‑fashion mechanism for creating globally distinctive IDs and attaching public keys and repair endpoints to them. Builders create DIDs, probably utilizing current Curve25519‑based mostly keys from right this moment’s PGP world, and publish DID paperwork through safe channels comparable to HTTPS‑based mostly “did:internet” endpoints that expose their public key infrastructure and the place to ship encrypted messages.

On high of that, the venture makes use of a decentralized messaging material that may be REST, DIDComm, or one other belief‑spanning protocol. This allows members to determine relationships and change credentials with out revealing their bodily location or community topology. Every relationship makes use of its personal random, ephemeral DIDs, making it far tougher for observers operating messaging infrastructure to deduce who’s speaking to whom or to map the kernel’s social graph.

In a reside demo, Gore walked by how a brand new developer with no prior credentials spins up an id, joins a Linux Basis neighborhood, after which establishes a relationship with one other participant utilizing pairwise DIDs. As soon as that relationship exists, the 2 sides can change richer, verifiable relationship credentials (VRCs) that report info comparable to when the connection began, the extent of belief it displays, and the way lengthy the credential ought to stay legitimate.

Additionally: AI is creeping into the Linux kernel – and official policy is needed ASAP

For kernel maintainers, the thought is that these credentials would again the identities behind signed code: as a substitute of relying solely on a PGP key signed at a convention years in the past, maintainers may test a bundle of recent credentials proving that the important thing they see belongs to the identical individual acknowledged by the Linux Basis, their employer, or different trusted issuers. These credentials might be fed into transparency logs and different audit methods.

Montgomery and others have been cautious to say that Linux ID won’t magically stop one other xz‑fashion provide‑chain assault, however they argue it materially raises the price. As an alternative of a single PGP key and a handful of signatures, an attacker would want to build up and preserve a number of, quick‑lived credentials from issuers that may revoke them and from neighborhood members whose personal reputations are in play, all whereas their exercise is streamed into public or semi‑public transparency logs.

It is a know-how stack, not a hard and fast coverage

The system’s design additionally pushes towards shorter‑lived attestations: issuers are inspired to situation credentials legitimate for days or perhaps weeks, not years, and to depend on belief registries that may flag revoked credentials even when the issuer and holder are not in direct contact. That mixture of rolling credentials and registry‑backed revocation offers the neighborhood extra levers to reply when a contributor seems to not be who they claimed to be or when an actual developer’s system or keys are compromised.

Additionally: Why my favorite Linux distro is slowing down – and I’m thrilled about it

One theme reiterated all through the session was that Linux ID is a know-how stack, not a hard and fast coverage. Totally different communities, from the core kernel to different Linux Basis tasks, will be capable to select which issuers they belief, what degree of proof they require for various roles, and whether or not AI brokers can act beneath delegated credentials to carry out automated duties like steady integration or patch testing.

The identical mechanisms that permit a maintainer vouch for a human contributor can cryptographically delegate restricted authority to an AI agent or service, with separate credentials and belief contexts that may be revoked independently if one thing goes unsuitable. Researchers from the Harvard Applied Social Media Lab and others are already experimenting with suitable apps that mix human and AI members in the identical credential‑conscious conversations, hinting at how Linux ID would possibly intersect with future developer tooling.

Linux ID has but to be deployed. Kroah‑Hartman stated the hassle continues to be in an exploratory and prototyping stage. The plan is to take the dialogue to Linux Plumbers and the Kernel Summit over the approaching yr. Within the close to time period, kernel.org may import its current PGP internet of belief into the brand new system to ease migration, whereas maintainers start testing the instruments in parallel with right this moment’s PGP‑based mostly processes.

Additionally: I found the best Linux server distros for your home lab

Barbosa and others framed the work as a part of a broader push for the Linux Basis to guide on decentralized belief infrastructure. In different phrases, this know-how is not only for kernel builders. It is for any open-source neighborhood or AI‑pushed ecosystem going through a quickly worsening id and authenticity disaster. 

As soon as deployed, future builders and code shall be backed not solely by a signed tag however by a wealthy, cryptographically verifiable story about who stands behind it. This implies Linux code shall be safer than ever. 





Source link

Tags: authenticatingCodedevelopersExploresHeresLinuxworks
admin

admin

Recommended

Trader claims to lose $310K on dodgy exchange pitched in LinkedIn request

Trader claims to lose $310K on dodgy exchange pitched in LinkedIn request

2 years ago
The Importance of Investor Protection in the Crypto and Blockchain Industry

The Importance of Investor Protection in the Crypto and Blockchain Industry

2 years ago

Popular News

  • Protocol-Owned Liquidity: A Sustainable Path for DeFi

    Protocol-Owned Liquidity: A Sustainable Path for DeFi

    0 shares
    Share 0 Tweet 0
  • Cryptocurrency for College: Exploring DeFi Scholarship Models

    0 shares
    Share 0 Tweet 0
  • What are rebase tokens, and how do they work?

    0 shares
    Share 0 Tweet 0
  • What is Velodrome Finance (VELO): why it’s a next-gen AMM

    0 shares
    Share 0 Tweet 0
  • $10 XRP Price Envisioned By Fund Manager As Ripple Mounts Trillion-Dollar Payment Markets ⋆ ZyCrypto

    0 shares
    Share 0 Tweet 0

Latest

Here’s How Much Ripple’s CTO XRP Holdings Would Be Worth If He Never Sold

Here’s How Much Ripple’s CTO XRP Holdings Would Be Worth If He Never Sold

May 8, 2026
Your electronics could be quietly draining energy – this gadget prevents that

Don’t connect your smart plug to these 5 household devices – an expert warns

May 8, 2026

Categories

  • Altcoins
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs & Metaverse
  • Regulations
  • XRP

Follow us

Recommended

  • Here’s How Much Ripple’s CTO XRP Holdings Would Be Worth If He Never Sold
  • Don’t connect your smart plug to these 5 household devices – an expert warns
  • After using Lenovo’s $2,600 Yoga, I’m taking premium Windows laptops seriously again
  • I started clearing my Roku cache, and it fixed my biggest TV complaint
  • The best VPN extensions for Chrome in 2026: Expert tested and reviewed
  • About us
  • Privacy Policy
  • Terms & Conditions

© 2023 TheBlockchainPage | All Rights Reserved

No Result
View All Result
  • Home
  • Cryptocurrency
  • Blockchain
  • Bitcoin
  • Market & Analysis
  • Altcoins
  • DeFi
  • Ethereum
  • Dogecoin
  • XRP
  • Regulations
  • NFTs

© 2023 TheBlockchainPage | All Rights Reserved