Главная
Study mode:
on
1
Intro
2
Hash Functions
3
Merkle Trees - Inclusion
4
Transparency Logs - Consistency
5
Witnessing - Split View Attack
6
Witnessing - Gossiping
7
Monitoring
8
Certificate Transparency
9
Binary Transparency - Sigstore
10
Key Transparency
11
Goals of Privacy Law
12
Transparency Logs & Privacy
13
Guiding principles
14
Destructive - Deleting entries from log
15
Destructive - Removing log
16
Prevent - Appropriate checks
17
Prevent - Pseudonymity
18
Log Frontend Blocks Requests
19
Move Sensitive Data Out of Log
20
Keep Log Operator Accountable
21
Conclusion
Description:
Explore privacy-preserving approaches to transparency logs in this informative conference talk. Delve into the technical details of append-only logs and their growing prominence in infrastructure, including certificate authorities and Sigstore. Examine the challenges of maintaining log integrity while addressing privacy concerns and right to erasure requests. Compare and contrast techniques for providing immutable, auditable logs while preserving users' rights. Learn about hash functions, Merkle trees, witnessing, monitoring, and various transparency log implementations. Discover guiding principles and strategies for balancing transparency and privacy, such as destructive methods, prevention techniques, and ways to keep log operators accountable. Gain insights into the intersection of transparency logs and privacy laws, equipping yourself with knowledge to navigate this complex landscape.

Privacy-preserving Approaches to Transparency Logs

Linux Foundation
Add to list
0:00 / 0:00