project-oak / transparent-release
Making transparency normal!
☆24Updated last year
Alternatives and similar repositories for transparent-release:
Users that are interested in transparent-release are comparing it to the libraries listed below
- Administrative utility for SEV-SNP☆30Updated 2 weeks ago
- Split-Trust Encryption Tool for ubiquitous data encryption.☆38Updated last week
- ☆22Updated this week
- Initial discussions on signatures of WebAssembly modules.☆16Updated 2 years ago
- An Architecture for Trustworthy Digital Supply Chain Transparency Services☆12Updated this week
- Constructing Trusted Execution Environment (TEE) with GCP Confidential Space☆16Updated last year
- Design documents and interoperability tests for Interoperable RA-TLS projects☆11Updated last year
- Attestation verification services based on Veraison components☆27Updated last week
- A CLI tool for interacting with SEV-SNP guest environment☆57Updated last month
- Generic Attestation Service☆41Updated last year
- Source Code Transparency☆11Updated last year
- Formal specification of attestation mechanisms in Confidential Computing☆18Updated 6 months ago
- Process-based Confidential Container Runtime☆81Updated this week
- Library for AMD SEV☆20Updated 2 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated 11 months ago
- Miscellaneous materials related to the "attested TLS" proof-of-concept☆18Updated last year
- Confidential Containers Guest Tools and Components☆91Updated this week
- Securing open-source package ecosystems by originating, validating, and augmenting build attestations.☆33Updated this week
- A Confidential Computing-Aware Certificate Authority☆10Updated this week
- Website for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆21Updated last month
- egrets monitors egress☆46Updated 4 years ago
- Resizable ORAM, remote storage agnostic, written in Rust☆70Updated 2 years ago
- ☆38Updated last year
- Trusted Certificate Service (TCS) is a K8s service to protect signing keys using Intel's SGX technology. K8s CSR and cert-manager CR APIs…☆30Updated last week
- ☆31Updated this week
- RATS Architecture☆17Updated 6 months ago
- Go Trusted Execution Environment (TEE)☆118Updated this week
- Libraries and binaries for running witnesses for verifiable logs☆24Updated this week
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 6 months ago
- Meeting materials☆16Updated 3 weeks ago