Once again, the file has no timestamping/countersignatures.
Going back to a file I downloaded on 2024-07-14, that cert looks better and most importantly has a countersignature/timestamping from Digicert’s Timestamp server.
@jamesaepp what you are observing is correct however how did you notice this? Do you get any warning in Windows? It’s not common for users to be checking how MSI file is being signed before installing.
I’m now using Azure Trusted Signing instead of DigiCert. Azure Trusted Signing is rotating certificates daily with 3 day lifespan.
But I didn’t include timestamp so the certificate was validated against the current time rather than the time the code was signed. I fixed that now. Thanks