Help, I need a code signing certificate that won't bankrupt me.
Three years ago, I paid $100 for a three-year code signing certificate. I've signed all my open-source projects' releases with it. Now that it's renewal time, Certera (SignMyCode.com) wants almost $700 for the same three-year certificate (excluding the mandatory HSM purchase, which I am totally on board with).
I write silly C and PowerShell code, and I timestamp my signatures so that they're perpetually valid. My PowerShell Gallery stuff, as well as binaries of aprs-weather-submit on Windows and macOS, are all signed and hashed (but not notarized by Apple, because that's another $99 a year for something that feels done unless Bob Bruninga's followers are thinking about APRS 2.0).
If I can't find a solution, anything I write or update in the future will have to be released as unsigned unless I half-ass something (like the Notepad++ developer using self-signed certs -- semi-dangerously clever). $100 every three years, fine. $700 every three years, and I'll do it if my three fans click my Buy Me A Coffee link over and over.
Is there any CA out there that will offer open-source, not-for-profit developers like me a chance to get globally-trusted code signing certificates? I don't think SigStore ever took off (sadly), and even if it did, I don't think it's part of the Microsoft Authenticode program.
#CodeSigning #SSL #TLS #certificates #Certera #SoftwareDevelopment #C #PowerShell #PowerShellGallery #AmateurRadio #HamRadio #APRS #APRS-Weather-Submit #GitHub #security #developer #Windows #macOS #Linux #Authenticode #DevSecOps #DevOps
SALLY STRUTHERS: Do you use floats? Sure. We all do. But did you know a + b + c ≠ c + b + a with many floats? No. Well, neither did I, but with this one PDF you can become a fount of floating-point foibles to impress and depress your colleagues around the water cooler. Isn't this fun?
at this point anybody still using solarwinds should just be considered a huge security risk
https://www.theregister.com/2025/09/23/solarwinds_patches_rce/
RE: https://infosec.exchange/@quarkslab/115254681302340584
Hard to believe that arbitrary RW to physical pages and arbitrary RW of LSTAR MSR are just bugs and not backdoors but I've seen too many of those things to by default attribute it to malice
New video: Inside Windows Sessions
https://trainsec.net/library/windows-internals/inside-windows-sessions/
With all this discourse about "AI art" I think we've lost sight of the simple joy of generating terrible nonsense via Markov Chains
UXLINK exploited for around $28 million, then hacker gets phished
September 22, 2025
https://www.web3isgoinggreat.com/?id=uxlink-exploit