Comment Re:Sign, sign, sign, sign. (Score 2, Informative) 666
It isn't hard to create a key, upload it to the keyservers, and sign your backdoored glibc.
So unless you can trust the entity who signed the package, it's all moot.
Obviously, the debian project could sign the package using the Debian Package Signing Key, but you've just changed the problem from "how can an end user know that this key is worth trusting" to "how can debian know that this key is worth trusting". This is (probably) solvable, but still quite hard.
Note that the technology is easy, but the processess to back it up aren't.
So unless you can trust the entity who signed the package, it's all moot.
Obviously, the debian project could sign the package using the Debian Package Signing Key, but you've just changed the problem from "how can an end user know that this key is worth trusting" to "how can debian know that this key is worth trusting". This is (probably) solvable, but still quite hard.
Note that the technology is easy, but the processess to back it up aren't.