Click any tag below to further narrow down your results
Links
This article discusses how Sigstore is evolving to support multiple cryptographic algorithms while maintaining security. It details the challenges posed by rigid algorithms and outlines recent updates that allow for controlled flexibility in signing artifacts. The changes ensure that software signatures remain valid and secure over time.
This article explores a creative approach to representing software dependencies using a stacked tower metaphor. The author details the challenges of eliminating edge crossings in a directed acyclic graph (DAG) and outlines a structured method to manage complex dependency relationships through transitive reduction, edge shortening, and planarity repair.