You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By 2022 or beyond we need to focus on operational security of ourselves and our users.
Our testing servers, Github accounts (e.g. 2-factor for everybody), and users might be compromised by a determined adversary. Our users are vulnerable during the startup phase. We implemented the download of 25MByte of initial Trustchain data. In the 2022+ future we should consider upgrading our core infrastructure to be trustworthy. Leading CPU manufacturers have been know to create critical bugs and cripple user security for business interests. Alternative trustless infrastructure marketing blurb:
Talos™ II drives the state of the art of secure computing forward. Talos™ II gives you — and only
you — full control of your machine's security. Rest assured knowing that only your authorized
software and firmware are running via POWER9's secure boot features. Don't trust us? Look at the
secure boot sources yourself — and modify them as you wish. That's the power of Talos™ II.
In an industry first, Talos™ II ships with fully open and auditable BMC firmware, based on the
Open BMC project. Gone are the days when you had to carefully isolate the buggy, insecure BMC
port from threats at the firewall level. With Talos™ II, the BMC is just another Linux system
that can be maintained as part of normal workflow. Find a bug or vulnerability? No problem;
just patch, recompile, and install.
The text was updated successfully, but these errors were encountered:
By 2022 or beyond we need to focus on operational security of ourselves and our users.
Our testing servers, Github accounts (e.g. 2-factor for everybody), and users might be compromised by a determined adversary. Our users are vulnerable during the startup phase. We implemented the download of 25MByte of initial Trustchain data. In the 2022+ future we should consider upgrading our core infrastructure to be trustworthy. Leading CPU manufacturers have been know to create critical bugs and cripple user security for business interests. Alternative trustless infrastructure marketing blurb:
The text was updated successfully, but these errors were encountered: