Главная
Study mode:
on
1
Intro
2
The issue on the table
3
A link to the past
4
Put a lock on it?
5
Signing: the reality
6
The ties that cryptographically bind
7
Keys and identity
8
Key hygiene
9
oh no
10
Review: I'm a signature , not a cop
11
The Update Framework (TUF)
12
Case study: Uptane
13
Case study: PyPI & PEP 480
14
Case study: Notary v2
15
Takeaways
16
Questions?
Description:
Explore the intricacies of code signing and digital signatures in this thought-provoking conference talk. Delve into the security foundations of software supply chains, questioning the assumptions behind digital signatures and their role in ensuring software integrity. Examine policy choices surrounding key handling, signature validity, and the concept of digital identity. Learn about real-world applications through case studies of The Update Framework (TUF), Uptane, PyPI, and Notary v2. Gain insights into key hygiene practices and the limitations of digital signatures. Challenge your understanding of cryptographic trust and leave with a deeper appreciation for the complexities of secure software distribution.

Whose Sign Is It Anyway?

CNCF [Cloud Native Computing Foundation]
Add to list