Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CNCF [Cloud Native Computing Foundation]

Beyond Signatures - Using TUF and Notary to Secure Software Distribution

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore the critical aspects of secure software distribution in this conference talk. Delve into The Update Framework (TUF) and its application in protecting against attacks on software distribution and updates. Discover how TUF can enhance security for registries and learn about its adaptation for use with the Notary v2 project. Examine the threat model, cryptographic signatures, and their limitations. Gain insights into TUF attacks, principles, and features such as explicit and implicit relocation and offline keys. Understand the importance of securing the system and explore new features in this comprehensive overview of TUF and Notary for software distribution security.

Syllabus

Intro
Why do we care
What are we doing
Threat model
Cryptographic signatures
The downside of cryptographic signatures
Summary of attacks
TUF attacks
TUF principles
Explicit and implicit relocation
Offline keys
Securing the system
New features
Learn more

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Beyond Signatures - Using TUF and Notary to Secure Software Distribution

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.