diff options
author | Rasmus Dahlberg <rasmus@mullvad.net> | 2022-03-27 22:48:48 +0200 |
---|---|---|
committer | Rasmus Dahlberg <rasmus@mullvad.net> | 2022-03-27 22:48:48 +0200 |
commit | db6ad1e00ea255fdae9306ab3133debcbd4d1732 (patch) | |
tree | 9c81317478b99220868baa42463fdeafd80f5e9d /hugo/content/_index.md | |
parent | dcf08e5f695afe5cf0b84f1131e0c2599ae229ad (diff) |
update source of www.sigsum.org
New template, font, colors, and logo. A few edits to text, chunking it
up under a few different pages that can be navigated.
Diffstat (limited to 'hugo/content/_index.md')
-rw-r--r--[l---------] | hugo/content/_index.md | 26 |
1 files changed, 25 insertions, 1 deletions
diff --git a/hugo/content/_index.md b/hugo/content/_index.md index fe84005..24879e2 120000..100644 --- a/hugo/content/_index.md +++ b/hugo/content/_index.md @@ -1 +1,25 @@ -../../README.md
\ No newline at end of file +Sigsum logging brings transparency to signed checksums. This makes it possible +to detect malicious and unintended key-usage. In other words, no signature +accepted by an end-user goes unnoticed. + +> A new signature made with my key was just logged. +> Was that signature expected? + +Specific use-cases can be implemented on-top of the minimal building block that +Sigsum provides. Examples include transparency for executable binaries, TPM +quotes, and onion address rulesets. + +> Everyone gets the same binaries. +> Signed binary checksums become public in Sigsum logs. +> Each binary is locatable on a separate release page. +> An independent monitor can verify these claims. + +Sigsum is designed to be secure against a powerful attacker that controls: + + - The signer's secret key and infrastructure + - The log's secret key and infrastructure + - A threshold of so-called witnesses that cosign the log + +Any use-case that cannot tolerate a few minutes of logging latency is out of +scope. This and other aspects keep the Sigsum design simple, both with regards +to operations and end-user verification. |