Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical importance of maintaining up-to-date cryptography in this 29-minute conference talk by Daiki Ueno from Red Hat. Discover an innovative approach to auditing algorithm usage in system deployments, designed to detect legacy algorithms without compromising performance or privacy. Learn about the implementation of USDT (user statically defined tracepoints) and eBPF programs for event tracing, as well as the use of eBPF ringbuffer and io_ring for asynchronous processing with privacy-preserving logging. Gain insights into the practical applications of this methodology, expanding on the initial presentation at DevConf.CZ 2023, and understand how to keep your systems secure with the latest cryptographic standards.