Wednesday, March 18, 2026

What does Code Signing do for Windows and Chrome. What about expired certificates?

 


🔐 What Code Signing Actually Does

Code signing is a broad, platform‑agnostic idea:

  • Uses a digital certificate (X.509)

  • Signs a cryptographic hash of the file

  • Proves:

    • Publisher identity

    • File integrity (no tampering)


🔍 Windows uses a code signing implementation called Authenticode 

A Windows PE signature absolutely is tied to a cryptographic hash of the file’s contents. When a file is signed:

  • Windows computes a hash of the file excluding only the signature block itself.

  • That hash is what the certificate signs.

  • Any modification to the code section, data section, resources, or most metadata changes the hash → signature becomes invalid.

This is why even editing something as trivial as a comment field in some file types can break the signature.

Authenticode (Microsoft’s Code Signing Standard) Brief

Authenticode is Microsoft’s specific implementation of code signing for Windows PE files. It defines:

✔️ What file regions are hashed

  • Everything except the WIN_CERTIFICATE block

  • PE headers, sections, resources, etc.

✔️ How the signature is embedded

  • Stored inside the PE file’s WIN_CERTIFICATE structure

  • Or in a catalog file for MSI/driver packages

✔️ How Windows verifies it

  • Uses WinVerifyTrust / Wintrust.dll

  • Chains the certificate to a trusted root

  • Ensures the file has not changed since signing

✔️ What it is used for

  • EXE, DLL, SYS (drivers), OCX

  • MSI installers

  • Catalog-signed packages

  • SmartScreen reputation

  • Windows Defender trust decisions

Authenticode is Windows‑specific and follows Microsoft’s rules.


🪟 1. Windows SmartScreen Reputation

This is the big one.

What it prevents:

  • The scary blue “Windows protected your PC” SmartScreen warning Once your certificate builds reputation, SmartScreen stops treating your EXE as an unknown threat.

How it works:

  • A newly signed EXE still shows SmartScreen warnings at first.

  • As more users run it without incident, Microsoft’s cloud reputation system improves.

  • Eventually, SmartScreen shows no warning at all.

What it does not prevent:

  • It does not bypass antivirus scanning.

  • It does not guarantee trust if the binary behaves maliciously.

🧩 2. “Unknown Publisher” Pop‑ups

Unsigned EXEs show:

Publisher: Unknown

Signed EXEs show:

Publisher: Your Company Name

What it prevents:

  • The “Unknown Publisher” label in:

    • Windows UAC prompts

    • File Properties → Digital Signatures

    • Installer dialogs

    • Some enterprise endpoint tools

This alone dramatically reduces user suspicion.

 What Code Signing Does for Chrome

Chrome doesn’t have its own SmartScreen, but it relies on Windows’ SmartScreen for downloaded EXEs.

What code signing prevents in Chrome:

  • Chrome’s “This file isn’t commonly downloaded” warning is less likely to appear.

  • Chrome is less likely to flag the file as “potentially dangerous.”

  • Chrome hands the file to Windows SmartScreen, which behaves better with a signed binary.

What it does not prevent:

  • Chrome will still warn if:

    • The file is extremely new

    • The file is rare

    • The file is signed but reputation is zero

    • The file is detected by antivirus engines

Signing helps, but reputation still has to build.


🔐 What Happens When a Signed EXE’s Certificate Expires

✅ 1. Already‑signed EXEs continue to run

If the EXE was timestamped at signing time (which almost all proper signing tools do), Windows checks:

  • Was the certificate valid at the time of signing

  • Is the timestamp authority trusted

If yes, the signature is still considered valid, even after expiration.

Result:

  • The EXE still shows Publisher: Your Company Name

  • The signature still verifies

  • SmartScreen reputation is preserved

This is why timestamping is essential.

⚠️ 2. If the EXE was not timestamped

This is where things go downhill.

Windows treats the signature as invalid because the certificate is now expired.

Result:

  • Signature shows as invalid

  • Windows UAC shows Unknown Publisher

  • SmartScreen treats it like an unsigned file

  • Chrome may warn that the file is “not commonly downloaded”

  • AV heuristics may become more aggressive

In other words, it behaves almost exactly like an unsigned EXE.

🪟 How Windows Behaves with an Expired Certificate

With timestamp:

  • ✔ Signature still valid

  • ✔ Publisher name still shown

  • ✔ SmartScreen reputation preserved

  • ✔ No scary warnings

  • ✔ Enterprise policies still trust it

Without timestamp:

  • ❌ Signature invalid

  • ❌ “Unknown Publisher”

  • ❌ SmartScreen warning returns

  • ❌ Reputation lost

  • ❌ Users get the big blue “Windows protected your PC” screen

 How Chrome Behaves

Chrome relies on Windows SmartScreen for downloaded EXEs.

With timestamp:

  • Chrome treats it like a valid signed file

  • Fewer warnings

  • Better trust score

Without timestamp:

  • Chrome treats it like an unsigned file

  • “This file isn’t commonly downloaded” becomes more likely

  • SmartScreen may block it outright

🧩 What Expiration Does Not Do

An expired certificate does not:

  • Break the EXE

  • Prevent it from running

  • Remove the signature from existing files

  • Cause antivirus to automatically flag it

The only real impact is trust and reputation, not functionality.

🧠 The Key Rule to Remember

**If you timestamp your EXE, expiration doesn’t hurt you.

If you don’t, expiration resets you to “Unknown Publisher.”**

Timestamping is the difference between a smooth user experience and a flood of support tickets.



Will your Microsoft Azure‑signed EXE certificates last 4 days, will Windows 11 stop the exe from running after 4 days?

A Windows EXE signed with Azure Trusted Signing will continue to run after the 3–4‑day certificate expires, as long as the signature was valid at the time of signing and the timestamp is valid. Windows does not block expired signatures — it only blocks signatures that were never valid or have been revoked.


🔍 What effect does recent Windows 11 Update to change certificate validation have?


🧩 1. Affected Update: KB5050021

Multiple reports show that KB5050021 introduced a change in how Windows validates certificate chains. After installing it, Windows began treating some certificates as explicitly revoked, even though the developers insist they were not.

  • Example: The popular tool Everything (Voidtools) stopped launching because Windows claimed its certificate—signed Jan 1, 2025—was revoked.

  • Rolling back the update restored functionality.

This strongly suggests the update tightened or altered the certificate trust logic rather than the certificates actually being revoked by DigiCert.

🛡️ 2. Why Windows Would Do This

Windows 11 has been steadily increasing enforcement around digital signatures for security reasons:

A. Stricter UAC Enforcement

Windows 11’s UAC blocks elevation for executables signed with revoked or untrusted certificates. If an update changes the trust store or revocation list, UAC will immediately start blocking affected apps.

B. Certificate Chain Hardening

Microsoft has been preparing for major certificate expirations (e.g., Secure Boot certificates expiring in 2026). This has led to more aggressive validation and cleanup of older or misconfigured certificate chains.

C. Driver & Executable Signature Enforcement

Windows 11 refuses to load drivers or executables if:

  • The certificate is expired

  • The certificate is revoked

  • The certificate chain is incomplete or mismatched

When an update modifies the trusted root store or revocation lists, legitimate software can get caught in the crossfire.

⚠️ 3. Why It Looked Like “Revoked Signature Updates”

The key issue is not that Microsoft intentionally revoked developer certificates. Instead, the update caused Windows to treat certain certificates as revoked because:

  • The DigiCert Trusted Root G4 chain was broken or reinterpreted

  • Revocation lists (CRLs/OCSP) were updated or misapplied

  • Windows tightened chain validation logic

  • Some intermediate certificates were removed or replaced

This created a false‑positive revocation scenario.

🧪 4. How Users Confirmed the Issue

People who restored a disk image before KB5050021 found everything worked normally. After reinstalling the update, the certificate errors returned.

This strongly indicates the update—not the certificates—was the trigger.

🧭 5. What You Can Do (Safely)

Here are the practical, non‑risky steps:

✔️ A. Check if the affected software has released a new build

Developers often re‑sign their binaries with a different certificate chain.

✔️ B. Temporarily uninstall KB5050021

If the issue is blocking critical tools, rolling back the update restores functionality.

✔️ C. Wait for Microsoft to patch the trust store

These certificate‑chain regressions are usually corrected in the next cumulative update.

✔️ D. Avoid disabling signature enforcement

While possible, it’s not recommended for system security.

If you want, I can walk you through diagnosing a specific executable or certificate chain on your system—just tell me the file or the error code you’re seeing.

 For Driver & Executable Signature Enforcement in Win11, will custom exes which are signed by Azure Trusted Signing and lasts 3-4 days, will it not run after 5 days ?

Here’s the clear, practical answer you need — and the part most people misunderstand:

A Windows EXE signed with Azure Trusted Signing will continue to run after the 3–4‑day certificate expires, as long as the signature was valid at the time of signing and the timestamp is valid. Windows does not block expired signatures — it only blocks signatures that were never valid or have been revoked.

Let’s break this down precisely.


 Will your Azure‑signed EXE stop running after 4 days?

Short answer: No — it will keep running indefinitely.

Azure Trusted Signing uses short‑lived signing certificates (typically 3–4 days), but this does not limit how long the signed executable can run.

What matters is:

✔️ The EXE must be timestamped at signing time.

When you sign with Azure Trusted Signing, the signing process automatically includes a trusted timestamp.

✔️ Windows checks the timestamp, not the certificate’s current validity.

If the certificate was valid at the moment of signing, Windows treats the signature as valid forever — even after the certificate expires.

❌ The EXE only fails if the certificate is revoked, not if it expires.

Expiration ≠ revocation. Revocation is rare and only happens if Microsoft/DigiCert explicitly pulls the certificate (e.g., malware abuse cases).

🧠 Why Azure uses short‑lived certificates

Azure Trusted Signing intentionally issues short‑lived certificates (3–4 days) to reduce the risk of certificate theft. This is normal and expected. Developers do not need to rebuild binaries every few days.

📌 Important: What would break your EXE?

Your EXE will only fail to run if:

❌ 1. You sign without a timestamp

Then Windows requires the certificate to still be valid. After 4 days, the signature becomes invalid.

❌ 2. The certificate is explicitly revoked

This is extremely rare but can happen if a certificate is abused for malware. Microsoft has revoked short‑lived certificates in such cases.

❌ 3. A Windows update breaks trust chain validation

This has happened recently with certain DigiCert chains, causing false “revoked” errors.

🧪 Practical example for your case

You sign your EXE on March 16 with Azure Trusted Signing.

  • Certificate expires on March 20

  • Timestamp says: “Signed on March 16 with a valid certificate”

  • Windows sees the timestamp and accepts the signature forever

  • Your EXE continues to run in April, May, 2027, etc.

No rebuild needed.


Tuesday, March 17, 2026

Saatva Matress Phishing Email with subject $300 Off Starts Your Better Sleep


For the record, this is a Saatva Matress 
phishing email attempt that is recently going around, with subject $300 Off Starts Your Better Sleep

What to do?  
Report them, goto bottom of page. 


From: Saatva Affiliate <alert@fremony.com>

Subject: $300 Off Starts Your Better Sleep




Saatva

Winter Savings
$300 OFF
your order of $1,000 or more
Shop Now

Made for Winter Nights
Every Saatva mattress is thoughtfully crafted with premium materials and responsive support, so you can enjoy deeper, uninterrupted rest.
Shop Now

Comfort & Luxury
Shop Now

Plush comfort layers

Enhanced back support

Dual-coil support base

3" Euro-pillow top

Lifetime Warranty
365-night home trial
Free delivery & setup
24/7 customer service

This is an advertisement.
This email was sent on behalf of Saatva.




PHISHING LINKs;

1. https://fremony.com/i/xxxx


How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from source domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Monday, March 16, 2026

BioLife Plasma Services Phishing Email with subject Give plasma. Get rewarded.


For the record, this is a BioLife Plasma Services storage 
phishing email attempt that is recently going around, with subject Give plasma. Get rewarded.

What to do?  
Report them, goto bottom of page. 


From: Biolife Partner <alert@northyism.com>

Subject:  Give plasma. Get rewarded.



“Something to smile about.

Get up to $800 when you donate plasma. Terms & Conditions apply.” “Get Started” “BioLife PLASMA SERVICES” **“Get Your Personalized New Donor Bonus in 3 Easy Steps Complete your profile Make a donation Get money for your time”** “Take the next step by finalizing your profile.” “Get Started” “Based on center location. Subject to change without notice. BIOLIFE and (BioLife Logo) are registered trademarks of Baxalta Incorporated. © 2026 Takeda Pharmaceutical Company Limited. All rights reserved. Terms & conditions apply. Subject to change without notice.”*

PHISHING LINKs;

1. https://northyism.com/c/xxxx


How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from source domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx