All core team members must enable two-factor authentication on GitHub (and any related platform).
You can start by using any TOTP application (that app with 6-digit codes). We just don’t recommend keeping TOTP codes in the same cloud where you have your GitHub password.
The best way to have 2FA is with a hardware key. Remember to store Recovery codes in a secure place in case you lose the key.
Your SSH key to access the repository is stored on your laptop.
All core team members must enable file system encryption for the machine.
Check the documentation for your operating system.
By default, anybody can make commits with your name.
We recommend enabling signing git commits to verify that these are commits really made by you:
git config --global commit.gpgsign true
If you don’t have a GPG key, you can use an SSH key (the same key you sign to GitHub):
git config --global gpg.format ssh
# Replace the path to your key
git config --global user.signingKey ~/.ssh/id_rsa.pub
Then add your SSH key also as the commit signing key:
- Open New SSH Key page.
- Select
Key type
:Signing key
. - Copy the content of
~/.ssh/id_rsa.pub
file (or other file you used inuser.signingKey
above).
If you’re on Windows Subsystem for Linux 2, this may help:
-
Add those lines to `~/.gnupg/gpg.conf:
use-agent pinentry-mode loopback
-
Add this line to
~/.gnupg/gpg-agent.conf
:allow-loopback-pinentry