From a641f31a2940c609e52251cd3c4e4cb4b774d6bf Mon Sep 17 00:00:00 2001
From: Daniel Micay
You should set a passphrase for the signing keys to protect them at rest. The - GrapheneOS release signing script expects the same passphrase to be used for each of - the keys. If you use swap, make sure that it's encrypted to avoid leaking unencrypted - keys to storage.
+The sample certificate subject (CN=GrapheneOS
) should be replaced with
+ your own information.
The sample certificate subject should be replaced with your own information.
+You should set a passphrase for the signing keys to keep them at rest until you + need to sign a release with them. By default, the keys are encrypted using scrypt for + key derivation and AES256 as the cipher. If you use swap, make sure it's encrypted, + ideally with an ephemeral key rather a persistent key to support hibernation. Even + with an ephemeral key, swap will reduce the security gained from encrypting the keys + since it breaks the guarantee that they become at rest as soon as the signing process + is finished. Consider disabling swap, at least during the signing process.
+ +The encryption passphrase for all the keys generated for a device needs to + match.
To generate keys for crosshatch (you should use unique keys per device variant):