From 7cef321e65c87b2d1ea49e9b471f43b36eab6a16 Mon Sep 17 00:00:00 2001 From: Jonas Schnelli Date: Thu, 7 May 2015 10:12:27 +0200 Subject: [Mac only] rename Bitcoin-Qt.app to "Bitcoin Core.app" --- share/certs/PrivateKeyNotes.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'share/certs/PrivateKeyNotes.md') diff --git a/share/certs/PrivateKeyNotes.md b/share/certs/PrivateKeyNotes.md index da299d168f..cbd060c268 100644 --- a/share/certs/PrivateKeyNotes.md +++ b/share/certs/PrivateKeyNotes.md @@ -7,7 +7,7 @@ signing requests. For OSX, the private key was generated by Keychain.app on Gavin's main work machine. The key and certificate is in a separate, passphrase-protected keychain file that is -unlocked to sign the Bitcoin-Qt.app bundle. +unlocked to sign the Bitcoin-Core.app bundle. For Windows, the private key was generated by Firefox running on Gavin's main work machine. The key and certificate were exported into a separate, passphrase-protected PKCS#12 file, and @@ -17,7 +17,7 @@ Threat analysis -- Gavin is a single point of failure. He could be coerced to divulge the secret signing keys, -allowing somebody to distribute a Bitcoin-Qt.app or bitcoin-qt-setup.exe with a valid +allowing somebody to distribute a Bitcoin-Core.app or bitcoin-qt-setup.exe with a valid signature but containing a malicious binary. Or the machine Gavin uses to sign the binaries could be compromised, either remotely or -- cgit v1.2.3