Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Maitt Saiwyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Maitt Saiwyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 8 - Code, Keys, and Chaos

36:22
 
Share
 

Manage episode 513142080 series 3695172
Content provided by Maitt Saiwyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Maitt Saiwyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed solution involves establishing a cryptographic "chain of custody" using cryptographic proofs, which are verifiable records that attest to the integrity and origin of the code at every stage. This requires every critical action, such as building, scanning, and testing, to be signed by a trusted authority using a private key, creating an unbroken, auditable trail.

The binary authorization process uses this chain of proofs to strictly control deployment; a system will only execute code if it can cryptographically verify that all required security checks and approvals have been signed off. This architecture creates a clear enforcement point to prevent code that has not been properly vetted, scanned for vulnerabilities, and approved from ever running. This defense-in-depth approach is vital because attackers often target the weakest points in the supply chain, such as developer accounts or build systems.

The concept of a "trusted build" is central to this strategy, ensuring that the final binary can be traced back to the original source code without any possibility of tampering or injection of malicious code. This is crucial for maintaining both confidentiality and integrity throughout the deployment lifecycle. Ultimately, the goal is to shift security away from a reactive model to a proactive, provable system that minimizes the risk from compromised sources.

  continue reading

21 episodes

Artwork
iconShare
 
Manage episode 513142080 series 3695172
Content provided by Maitt Saiwyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Maitt Saiwyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed solution involves establishing a cryptographic "chain of custody" using cryptographic proofs, which are verifiable records that attest to the integrity and origin of the code at every stage. This requires every critical action, such as building, scanning, and testing, to be signed by a trusted authority using a private key, creating an unbroken, auditable trail.

The binary authorization process uses this chain of proofs to strictly control deployment; a system will only execute code if it can cryptographically verify that all required security checks and approvals have been signed off. This architecture creates a clear enforcement point to prevent code that has not been properly vetted, scanned for vulnerabilities, and approved from ever running. This defense-in-depth approach is vital because attackers often target the weakest points in the supply chain, such as developer accounts or build systems.

The concept of a "trusted build" is central to this strategy, ensuring that the final binary can be traced back to the original source code without any possibility of tampering or injection of malicious code. This is crucial for maintaining both confidentiality and integrity throughout the deployment lifecycle. Ultimately, the goal is to shift security away from a reactive model to a proactive, provable system that minimizes the risk from compromised sources.

  continue reading

21 episodes

Tất cả các tập

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play