Get the latest tech news

We securely generate sensitive secrets


We regularly have to create and manage secrets that grant very sensitive privileges, and so we’ve created a new process that makes it fast and easy for us to securely and verifiably perform all kinds of sensitive operations.

Whether it’s the private key that lets you authenticate with an SSH server, the credential that grants you powers in AWS, or the password for your Minecraft account, you need some way to securely generate and manage it. Suppose we have a cloud service that connects to a third-party to exchange sensitive user information — we need a very high degree of trust in the fact that it has exclusive knowledge of its secrets, as otherwise we wouldn’t have confidence in the safety of our customers! Retrieving the generated artefacts is as simple as running a single command which will automatically verify the entire chain of trust and validate all the PCR values.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of sensitive secrets

sensitive secrets