Skip to content

Commit 2c6fe60

Browse files
authoredJul 26, 2021
Added link from main README to verifiable maps (#328)
1 parent 4733246 commit 2c6fe60

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed
 

‎binary_transparency/firmware/README.md

+9-7
Original file line numberDiff line numberDiff line change
@@ -340,14 +340,16 @@ go run cmd/publisher/publish.go --logtostderr --v=2 --timestamp="2020-10-10T23:0
340340
> Anybody else running a monitor also knows that malicious firmware has been
341341
> logged and can raise the alarm.
342342
343-
Developer Notes
344-
---------------
345343
346-
This section is not intended for a general audience.
347-
The intended audience is developers of FT that have a deployment and need to inspect or modify it.
344+
Further Work: Annotations and Verifiable Summaries
345+
--------------------------------------------------
348346
349-
#### Docker
347+
We have seen how to publish firmware and its metadata to a log, and how this can be used by firmware readers: clients flashing the firmware, and monitors scanning the firmware.
348+
Having all parties seeing the same view of the available data sets the foundation for a secure system, but making clients aware of bad firmware cannot be done only with the tools we have above.
350349
351-
Connecting to the Trillian database:
350+
The [ftmap README](fmd/../cmd/ftmap/README.md) outlines a verifiable solution to this problem.
351+
There are 2 key changes from the solution above:
352+
* In addition to firmware & metadata, the log also accepts annotations about firmware already in the log
353+
* A Verifiable Map is built from the log, which aggregates each piece of firmware with the annotations for it
352354
353-
`docker run -it --network deployment_default --rm mariadb mysql -hdeployment_mysql_1 -utest -pzaphod test`
355+
Clients can then use this verifiable map to efficiently discover all annotations about a piece of firmware before they rely on it.

0 commit comments

Comments
 (0)