I'm hoping someone could answer this for me. How do you trust the applications that `brew cask` installs?
What is preventing `brew cask install firefox` from installing something malicious? When I download an application manually, I trust the site I'm on by virtue of being there and being savvy enough to know it's a legitimate site. But when you script it, you lose the ability to gauge see for yourself what you're downloading.
I realize I could probably do: `brew cask info firefox`, find the ruby file it points to (https://github.com/caskroom/homebrew-cask/commits/master/Cas...), open that up, verify the link is trustworthy.. but I don't want to do that for every installation. And if it's valid now, what's to prevent it from changing in the future?
Hey there! This is a valid concern, but I don't think it's all that different from using Homebrew. The community maintains the cask definitions, and all pull requests are reviewed via the project team. There's a checksum verification feature built in, though we're still figuring out how to reconcile that with un-versioned download URLs [1].
At the end of the day, when you use any package management software, you are implicitly trusting the team that maintains said software. Perhaps it would be better for us to do our best to force users to make that trust more explicit? It's an interesting question - any suggestions you have would be more than welcome - feel free to open an issue to discuss! :)
Does anyone know of any software that can do this (for OS X)? I think double-tap Shift to toggle Caps Lock would be pretty neat. Or even better, I'd like to program an action after double-Shift (or other modifier keys too, Control, Option, Command).
Edit: I got this to work using KeyRemap4MacBook, if anyone's interested, use this snippet in private.xml:
<item>
<name>Double-Shift to Caps Lock</name>
<appendix>Double-tap ⇧ to Caps Lock</appendix>
<identifier>double_tap_shift_to_caps_lock</identifier>
<autogen>
--DoublePressModifier--
KeyCode::SHIFT_L,
KeyCode::SHIFT_L,
KeyCode::CAPSLOCK
</autogen>
</item>
What is preventing `brew cask install firefox` from installing something malicious? When I download an application manually, I trust the site I'm on by virtue of being there and being savvy enough to know it's a legitimate site. But when you script it, you lose the ability to gauge see for yourself what you're downloading.
I realize I could probably do: `brew cask info firefox`, find the ruby file it points to (https://github.com/caskroom/homebrew-cask/commits/master/Cas...), open that up, verify the link is trustworthy.. but I don't want to do that for every installation. And if it's valid now, what's to prevent it from changing in the future?
How do you guys justify using cask?