On Fri, Dec 16, 2011 at 08:38:03AM -0800, Jonathan Wilkes wrote: > So when someone hacks the extension website and changes the code for > "Popular Extension #1" to log the user's keystrokes, how > > does my Gnome Shell know to reject that rogue extension when I try to install > it?
If the website is hacked, the GPG signature would still be added. -- Regards, Olav _______________________________________________ gnome-shell-list mailing list [email protected] http://mail.gnome.org/mailman/listinfo/gnome-shell-list
