<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.baszerr.eu/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>BaSzErr - blog:2023:06:06</title>
        <description></description>
        <link>https://www.baszerr.eu/</link>
        <lastBuildDate>Wed, 06 May 2026 07:55:44 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://www.baszerr.eu/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
            <title>BaSzErr</title>
            <link>https://www.baszerr.eu/</link>
        </image>
        <item>
            <title>2023-06-06_-_github_personal_readme</title>
            <link>https://www.baszerr.eu/doku.php?id=blog:2023:06:06:2023-06-06_-_github_personal_readme</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;github_personal_readme&quot;&gt;2023-06-06 - github personal readme&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
recently i&amp;#039;ve listened to &lt;a href=&quot;https://darknetdiaries.com/episode/133/&quot; class=&quot;urlextern&quot; title=&quot;https://darknetdiaries.com/episode/133/&quot; rel=&quot;ugc nofollow&quot;&gt;i&amp;#039;m the real Connor&lt;/a&gt; episode of &lt;a href=&quot;https://darknetdiaries.com&quot; class=&quot;urlextern&quot; title=&quot;https://darknetdiaries.com&quot; rel=&quot;ugc nofollow&quot;&gt;darknet diaries&lt;/a&gt;. &lt;abbr title=&quot;Too long; didn&amp;#039;t read&quot;&gt;TL;DR&lt;/abbr&gt; version is that guy found himself in a situation, where his (very reach) github profile was used by a different person, to get to a job interview (i.e. “look at all my great work” – except it was some1 else&amp;#039;s profile).
&lt;/p&gt;

&lt;p&gt;
it got me into thinking – how could it be prevented? obviously HR person could just ask for a specific commit on a private repo, shared with this person. this way it can be proven that the person has R/W access there. a bit of a fuss for both sides, but doable. is there any passive way?
&lt;/p&gt;

&lt;p&gt;
how would u then warn recruiter… or in fact – any other person that want to verify you is you? what crossed my mind is GPG keys (that i use for year now) and a github note, clearly visible on a main profile. turns out github allows to add private notes, that are always visible on the main page. it&amp;#039;s just a bit “hidden feature”, as one &lt;a href=&quot;https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-github-profile/customizing-your-profile/managing-your-profile-readme#adding-a-profile-readme&quot; class=&quot;urlextern&quot; title=&quot;https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-github-profile/customizing-your-profile/managing-your-profile-readme#adding-a-profile-readme&quot; rel=&quot;ugc nofollow&quot;&gt;must create a repo, named the same as the account, and put a README.md there&lt;/a&gt;. once done profile looks like this:
&lt;/p&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.baszerr.eu/lib/exe/detail.php?id=blog%3A2023%3A06%3A06%3A2023-06-06_-_github_personal_readme&amp;amp;media=blog:2023:06:06:gh_prfile.png&quot; class=&quot;media&quot; title=&quot;blog:2023:06:06:gh_prfile.png&quot;&gt;&lt;img src=&quot;https://www.baszerr.eu/lib/exe/fetch.php?w=600&amp;amp;tok=594067&amp;amp;media=blog:2023:06:06:gh_prfile.png&quot; class=&quot;media&quot; loading=&quot;lazy&quot; title=&quot;my github profile note&quot; alt=&quot;my github profile note&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
now this is loud and clear warning, for other side to detect sth is fishy (eg. unsigned e-mail, or e-mail signed with a different key). it&amp;#039;s also verifiable w/o owner being actively involved. last, but not least – it just looks nice. :)
&lt;/p&gt;

&lt;p&gt;
you might have noticed i&amp;#039;ve also mention commits are being signed, too. that&amp;#039;s another topic. supply chain attacks are getting more and more common in &lt;abbr title=&quot;Free &amp;amp; Open-Source Software&quot;&gt;FOSS&lt;/abbr&gt; world. possible attack vector here is: account being taken over. if this happens, how can users tell if commit / release is legit? again – GPG comes to a rescue. with each genuine commit being signed, it&amp;#039;s easier for others to spot a problem and rise alarm.
&lt;/p&gt;

&lt;/div&gt;
</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 06 Jun 2023 18:34:51 +0000</pubDate>
        </item>
    </channel>
</rss>
