home.social

#transparencylog — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #transparencylog, aggregated by home.social.

  1. There's been an update to the #Google #Pixel Binary #TransparencyLog: security.googleblog.com/2023/0 with technical details at developers.google.com/android/ and developers.google.com/android/

    This binary transparency log has been collecting all publicly released factory images for Pixel 6 and newer devices. If an images is included in the log, it is publicly known to exist. If it is not included, then it might be a targeted attack. So even when signing keys leak or are used through potential insider attacks, an attacker is left with only two choices: make public that a (potentially malicious) image was signed with the misused key and expose it to analysis, or not push it to the log and therefore make it detectable as not officially published.

    I have been running a #TransparencyLog #Witness for multiple logs. including the Pixel log, for a while at our Institute of Networks and Security at #JKU (Johannes Kepler University) Linz, feeding into 2 different redistributors for these co-signatures: github.com/mhutchinson/mhutchi and github.com/WolseyBankWitness/r. Running a witness is low effort, takes minimal resources, and strengthens the security of transparency logs. If you can, please start more long-lived (that's the most important property) witnesses in other geo-political regions for even better decentralization of trust 😉​