Hi Michael and Dirk,

there are raising concerns that, as of today's computing power, an attacker can
generate a GPG key that has the same short ID as a target key.  In this
situation, it may be possible that a user downloads and trusts the attacker's
GPG key, and as a consequence installs malware.

For that reason (better explained in http://lwn.net/Articles/697417/), it is 
recommended to use long IDs or
even full fingerprints.  I am therefore suggesting to update the instructions
at <https://cran.rstudio.com/bin/linux/ubuntu/>.

s/E084DAB9/E298A3A825C0D65DFD57CBB651716619E084DAB9/

(Note that I tested only in Debian Stable, which is one year older as Trusty,
so it might be good to doublecheck on a Trusty system that it works as
expected.)

Have a nice day,

Charles

-- 
Charles Plessy
Tsurumi, Kanagawa, Japan

_______________________________________________
R-SIG-Debian mailing list
R-SIG-Debian@r-project.org
https://stat.ethz.ch/mailman/listinfo/r-sig-debian

Reply via email to