Beyond Signatures - Using TUF and Notary to Secure Software Distribution

Beyond Signatures - Using TUF and Notary to Secure Software Distribution

CNCF [Cloud Native Computing Foundation] via YouTube Direct link

Cryptographic signatures

5 of 14

5 of 14

Cryptographic signatures

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Beyond Signatures - Using TUF and Notary to Secure Software Distribution

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why do we care
  3. 3 What are we doing
  4. 4 Threat model
  5. 5 Cryptographic signatures
  6. 6 The downside of cryptographic signatures
  7. 7 Summary of attacks
  8. 8 TUF attacks
  9. 9 TUF principles
  10. 10 Explicit and implicit relocation
  11. 11 Offline keys
  12. 12 Securing the system
  13. 13 New features
  14. 14 Learn more

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.