On Fri, Dec 16, 2011 at 08:38:03AM -0800, Jonathan Wilkes wrote:
> So when someone hacks the extension website and changes the code for
> "Popular Extension #1" to log the user's keystrokes, how 
> 
> does my Gnome Shell know to reject that rogue extension when I try to install 
> it?

If the website is hacked, the GPG signature would still be added.

-- 
Regards,
Olav
_______________________________________________
gnome-shell-list mailing list
[email protected]
http://mail.gnome.org/mailman/listinfo/gnome-shell-list

Reply via email to