aboutsummaryrefslogtreecommitdiff
path: root/hugo/content/_index.md
diff options
context:
space:
mode:
authorRasmus Dahlberg <rasmus@mullvad.net>2022-03-27 22:48:48 +0200
committerRasmus Dahlberg <rasmus@mullvad.net>2022-03-27 22:48:48 +0200
commitdb6ad1e00ea255fdae9306ab3133debcbd4d1732 (patch)
tree9c81317478b99220868baa42463fdeafd80f5e9d /hugo/content/_index.md
parentdcf08e5f695afe5cf0b84f1131e0c2599ae229ad (diff)
update source of www.sigsum.org
New template, font, colors, and logo. A few edits to text, chunking it up under a few different pages that can be navigated.
Diffstat (limited to 'hugo/content/_index.md')
-rw-r--r--[l---------]hugo/content/_index.md26
1 files changed, 25 insertions, 1 deletions
diff --git a/hugo/content/_index.md b/hugo/content/_index.md
index fe84005..24879e2 120000..100644
--- a/hugo/content/_index.md
+++ b/hugo/content/_index.md
@@ -1 +1,25 @@
-../../README.md \ No newline at end of file
+Sigsum logging brings transparency to signed checksums. This makes it possible
+to detect malicious and unintended key-usage. In other words, no signature
+accepted by an end-user goes unnoticed.
+
+> A new signature made with my key was just logged.
+> Was that signature expected?
+
+Specific use-cases can be implemented on-top of the minimal building block that
+Sigsum provides. Examples include transparency for executable binaries, TPM
+quotes, and onion address rulesets.
+
+> Everyone gets the same binaries.
+> Signed binary checksums become public in Sigsum logs.
+> Each binary is locatable on a separate release page.
+> An independent monitor can verify these claims.
+
+Sigsum is designed to be secure against a powerful attacker that controls:
+
+ - The signer's secret key and infrastructure
+ - The log's secret key and infrastructure
+ - A threshold of so-called witnesses that cosign the log
+
+Any use-case that cannot tolerate a few minutes of logging latency is out of
+scope. This and other aspects keep the Sigsum design simple, both with regards
+to operations and end-user verification.