Get the latest tech news
We securely generate sensitive secrets
We regularly have to create and manage secrets that grant very sensitive privileges, and so we’ve created a new process that makes it fast and easy for us to securely and verifiably perform all kinds of sensitive operations.
Whether it’s the private key that lets you authenticate with an SSH server, the credential that grants you powers in AWS, or the password for your Minecraft account, you need some way to securely generate and manage it. Suppose we have a cloud service that connects to a third-party to exchange sensitive user information — we need a very high degree of trust in the fact that it has exclusive knowledge of its secrets, as otherwise we wouldn’t have confidence in the safety of our customers! Retrieving the generated artefacts is as simple as running a single command which will automatically verify the entire chain of trust and validate all the PCR values.
Or read this on Hacker News