• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
Computer Business World News

Computer Business World News

Trending News about Computers, Business and Tech

  • Home
  • BUSINESS
  • CAREERS
  • CLOUD
  • COMPUTERS
  • CYBERSECURITY
  • I.T.
  • TECH
  • VOIP
  • About

Linux Foundation is making it easier to verify the authenticity of software coding

by

In a bid to secure the open source software supply chain, the Linux Foundation, together with Red Hat, Google, and Purdue University have combined to launch a new project to help developers cryptographically sign their software.

Considering the constant increase in the rate of industrial adoption of open source software, the project, called sigstore, aims to prevent an attack on a public software repository from injecting tainted code in the supply chain. 

“sigstore enables all open source communities to sign their software and combines provenance, integrity and discoverability to create a transparent and auditable software supply chain,” said Luke Hinds, Security Engineering Lead, Red Hat office of the CTO.

Supply chain security

Arguing that the modern software supply chain is exposed to multiple risks, the project says the existing toolset, which involves people meeting in person to sign each other’s keys, which has worked well for so long, isn’t anymore feasible in the current environment with geographically dispersed remote teams.

Now throw in the complexities of key management, revocation, public key distribution and artifact digests, and you end up in a situation where many open source projects choose not to sign their release in order to avoid the overhead.

To overcome this, sigstore pitches itself as “a free to use, non-profit software signing service that harnesses existing technologies of x509 PKI and transparency logs.” The new service will help developers and users understand and confirm the origin and authenticity of software, with minimum overhead.

It should be noted that the recent SolarWinds attacks were one of the most widespread and devastating examples of a supply chain attack.

“Securing a software deployment ought to start with making sure we’re running the software we think we are. sigstore represents a great opportunity to bring more confidence and transparency to the open source software supply chain,” said Josh Aas, executive director of the non-profit SSL certificate authority, Let’s Encrypt.

View Source

Filed Under: COMPUTERS

Primary Sidebar

More to See

For the first time in the Middle East, The Sultanate of Oman hosts the International Semiconductors Executive Summit

LONDON, Feb. 2, 2023 /PRNewswire/ -- To further enhance, strengthen and expand the global semiconductor ecosystem, the International Semiconductor … [Read More...] about For the first time in the Middle East, The Sultanate of Oman hosts the International Semiconductors Executive Summit

Diverse Sounds Make Oh! You Pretty Things Sparkle

Oh! You Pretty Things performs at Petra’s. (Photo by Connor Schlosser)“You can choose your friends, but you sho can’t choose your family,” Jem tells … [Read More...] about Diverse Sounds Make Oh! You Pretty Things Sparkle

Russian millionaire on trial in hack, insider trade scheme

BOSTON -- A wealthy Russian businessman and associates made tens of millions of dollars by cheating the stock market in an elaborate scheme that … [Read More...] about Russian millionaire on trial in hack, insider trade scheme

Footer

SITE INFORMATION

COMPUTER BUSINESS WORLD NEWS

About/Contact

Privacy Policy

Thank you for visiting our website.

Recent

  • 3 Challenges Women Face in the Cybersecurity Industry
  • For the first time in the Middle East, The Sultanate of Oman hosts the International Semiconductors Executive Summit
  • Diverse Sounds Make Oh! You Pretty Things Sparkle

Search

Copyright © 2023 Computer Business World