You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have seen how to publish firmware and its metadata to a log, and how this can be used by firmware readers: clients flashing the firmware, and monitors scanning the firmware.
348
+
Having all parties seeing the same view of the available data sets the foundation for a secure system, but making clients aware of bad firmware cannot be done only with the tools we have above.
350
349
351
-
Connecting to the Trillian database:
350
+
The [ftmap README](fmd/../cmd/ftmap/README.md) outlines a verifiable solution to this problem.
351
+
There are 2 key changes from the solution above:
352
+
* In addition to firmware & metadata, the log also accepts annotations about firmware already in the log
353
+
* A Verifiable Map is built from the log, which aggregates each piece of firmware with the annotations for it
352
354
353
-
`docker run -it --network deployment_default --rm mariadb mysql -hdeployment_mysql_1 -utest -pzaphod test`
355
+
Clients can then use this verifiable map to efficiently discover all annotations about a piece of firmware before they rely on it.
0 commit comments