Skip to content

Commit

Permalink
Merge pull request #87 from tracymiranda/addslides
Browse files Browse the repository at this point in the history
Add speaker slides & talk links
  • Loading branch information
mhutchinson authored Oct 17, 2024
2 parents 4787819 + ae34c6d commit f69bc06
Show file tree
Hide file tree
Showing 35 changed files with 78 additions and 23 deletions.
6 changes: 3 additions & 3 deletions content/schedule/_index.html
Original file line number Diff line number Diff line change
Expand Up @@ -15,14 +15,14 @@
<section class="glue-page gmt-3 gmb-1">
<div class="glue-grid gmb-5">
<div class="col-span-4 gmb-2 headline4">
<a href="wednesday.html">Wednesday, October 9</a>
Wednesday, October 9
</div>
<div class="col-span-4 gmb-2 headline4">
<a href="thursday.html">Thursday, October 10</a>
</div>
<div class="col-span-4 gmb-2 headline4">
Friday, October 11
<a href="friday.html">Friday, October 11</a>
</div>
</div>
</section>
{{< summit-list-talks "schedule" "2024-10-11" >}}
{{< summit-list-talks "schedule" "2024-10-09" >}}
3 changes: 3 additions & 0 deletions content/schedule/chrome.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@ speakerTitle:

Lessons learned from CT: scaling an ecosystem beyond a single log

* [Speaker Slides]({{< rel "/pdfs/summit2024/Scaling transparency ecosystems_ Lessons learned from CT.pdf" >}})
* [Talk Recording](https://youtu.be/59PU99hQfro?si=VKLsIo6etIIH2vri)

---

### Speaker
Expand Down
2 changes: 1 addition & 1 deletion content/schedule/closing.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,6 @@ speakerTitle:

Closing out the talk portion of the event we will have a fun closing quiz and some awards.

More details to come.
* [Talk Recording](https://youtu.be/lHfLMiiwsHA?si=Xr8aGOroSlS0DX0a)

</div>
2 changes: 2 additions & 0 deletions content/schedule/depsdev.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@ speakerTitle: Software Engineer, Google

What metrics, APIs and indexes on Certificate Transparency data would be useful to you? New to the CT ecosystem, [deps.dev](https://deps.dev/) is excited to be working with Certificate Transparency data and wants to hear from you. Hear about the insights [deps.dev](https://deps.dev/) has provided on open source packages, and hear about potential insights that [deps.dev](https://deps.dev/) could provide into Certificate Transparency data.

* [Talk Recording](https://youtu.be/vd1uaLH3V5Q?si=QbdVvFUXZeXKzfAO)

---

### Speaker
Expand Down
7 changes: 1 addition & 6 deletions content/schedule/healthcare.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,6 @@ speakerTitle: Projects by IF

<div class="font-google font-medium">


---

### Speaker


* [Talk Recording](https://youtu.be/Rj8l6Fd_iBg?si=CdCsqGpREbGX8pTU)

</div>
7 changes: 6 additions & 1 deletion content/schedule/keynote.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,12 @@ speaker: Al Cutter
---

<div class="font-google font-medium">
The opening keynote kicking off the event will be delivered by recent Levchin prize winner Al Cutter.

The opening keynote kicking off the event will be delivered by recent Levchin prize winner Al Cutter.

* [Speaker Slides]({{< rel "/pdfs/summit2024/tdev2024_ Opener.pdf">}})
* [Talk Recording](https://youtu.be/IJfgKh3gwOQ?si=hjTwg4SOj9z2pilS)

---

</div>
3 changes: 3 additions & 0 deletions content/schedule/kt-proton.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ speakerTitle: Proton

What are the challenges faced implementing key transparency for email? This talk looks at how Proton has approached implementing key transparency.

* [Speaker Slides]({{< rel "/pdfs/summit2024/Key Transparency Proton.pdf" >}})
* [Talk Recording](https://youtu.be/shUwnSFtP8g?si=Nf1hOIZhOrF-8hT9)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/letsencrypt.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ speakerTitle: SRE Tech Lead

Let's Encrypt operates one of the largest Certificate Authorities, along with Certificate Transparency logs. This talk discusses our experiences both as a submitter to CT as well as a log operator. We are excited about the new Sunlight log implementation, and will cover why we think Sunlight will be a good fit for us and for the larger CT ecosystem.

* [Speaker Slides]({{< rel "/pdfs/summit2024/Let's Encrypt CT @ Transparency Dev.pdf" >}})
* [Talk Recording](https://youtu.be/QZnz8pvsN_w?si=kZsrAYNHzenzKGVK)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/lightning-talk-ctkt.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@ speakerTitle: Senior Staff Cryptography Engineer, Mozilla
Append-only ledgers like Certificate Transparency logs are simple, elegant and the bedrock of most modern transparency systems. Key Transparency systems are comparatively complex, but achieve much stronger privacy and transparency properties and have in recent years proven they can be successfully deployed at a global scale.
This talk will consider systems that fall into the middle ground between these two approaches and ask whether they offer an interesting path forward for real world applications like the WebPKI.

* [Speaker Slides]({{< rel "/pdfs/summit2024/The Design Space between CT and KT.pdf">}})
* [Talk Recording](https://youtu.be/FRyNAer9SD8?si=IplimUj-UoNRraCN)

---

### Speaker
Expand Down
2 changes: 2 additions & 0 deletions content/schedule/lightning-talk-digital-id.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@ speakerTitle: IT Security Researcher at the Austrian Secure Information Technolo

In this lightning talk, we will explore the critical role of transparency logs in establishing trust and security within digital identity ecosystems. Transparency logs provide a robust mechanism for creating an auditable, tamper-proof record of credential lifecycle events, including issuance, presentations, and revocations. To implement these logs effectively, it is essential to utilize privacy-preserving cryptographic techniques, alongside scalable log structures and proof systems that can meet the requirements of large-scale digital identity solutions. We will examine how transparency logs can be applied to verifiable credential management systems, fostering accountability for issuers and verifiers while instilling confidence in users.

* [Talk Recording](https://youtu.be/6cNQTMQ5Qgg?si=uI2DGrwpjogCRzoE)

---

### Speaker
Expand Down
2 changes: 2 additions & 0 deletions content/schedule/lightning-talks-day1.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@ speakerTitle:

Transparency approaches have extremely wide applicability throughout the technology and information landscape. Different use cases have different functional and non-functional requirements which suggest the need for a diverse – but not too diverse – transparency ecosystem to enable broad, practical adoption. This lightning talk aims to stimulate conversation and highlight opportunities for advancement of transparency technology through interoperable data structures, standards, open source code, and group cooperation.

* [Talk Recording](https://youtu.be/x2qvdXjSKPE?si=4-yJc1nKMHIpV3tS)

---

### Speaker
Expand Down
26 changes: 19 additions & 7 deletions content/schedule/lightning-talks-day3.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,12 +13,24 @@ speakerTitle:
<div class="font-google font-medium">

Lightning Talks Schedule:
* Verifiable runtime transparency - Fredrik Strömberg
* Open Source Project Veraison - Yogesh Deshpande
* Auditing key transparency and making it public - Thibault Meunier
* The challenge of adopting post quantum cryptography - Bas Westerbaan
* Taking the pain a way with linear logs: its just an array! - Robin Bryce
* Running a Witness on Tkey? - Niels Möller
* Silent CT Monitoring - Rasmus Dahlberg
* Verifiable runtime transparency - Fredrik Strömberg
* [Speaker Slides]({{< rel "/pdfs/summit2024/RuntimeTransparency.pdf">}})
* [Talk Recording](https://youtu.be/Lo0gxBWwwQE?si=CdHxFFnr3o6nNJJR)
* Open Source Project Veraison - Yogesh Deshpande
* [Speaker Slides]({{< rel "/pdfs/summit2024/LightningTalk-ProjectVeraison.pdf">}})
* [Talk Recording](https://youtu.be/JqUXogjONqw?si=IbymQwimMTsaoOvu)
* Auditing key transparency and making it public - Thibault Meunier
* [Speaker Slides]({{< rel "/pdfs/summit2024/Auditing key transparency.pdf">}})
* [Talk Recording](https://youtu.be/XI3vfuaQuqE?si=jSwbWYwP23fT6MLY)
* The challenge of adopting post quantum cryptography - Bas Westerbaan
* [Speaker Slides]({{< rel "/pdfs/summit2024/Post quantum off the cuff.pdf">}})
* [Talk Recording](https://youtu.be/s0HQCx4wy44?si=wzj688mcaL8m4PTX)
* Taking the pain a way with linear logs: its just an array! - Robin Bryce
* [Talk Recording](https://youtu.be/pfMVQBUZfbQ?si=xNt2zuIpZljwgVRK)
* Running a Witness on Tkey? - Niels Möller
* [Talk Recording](https://youtu.be/fY_v7yNrl2A?si=YjKtPJGlXlph9qeL)
* Silent CT Monitoring - Rasmus Dahlberg
* <https://git.glasklar.is/rgdd/silentct>
* [Talk Recording](https://youtu.be/ca-qnXIo-2Y?si=kbglW1WV16AibCit)

</div>
2 changes: 2 additions & 0 deletions content/schedule/logingestion.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@ speakerTitle: Software Engineer, Google

This lightning talk explores the CT Logs Ingestion journey from RFC6962 to Static CT API. Curious about the real-world implementation story and lesson learnt? Join me in this talk to embrace the Static CT API logs.

* [Talk Recording](https://youtu.be/HmHJiNoTh9I?si=Zz9CMapSceA2gccc)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/pypi.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@ speakerTitle:

Over the past year, PyPI (the default package index for the Python ecosystem) has moved rapidly to adopt digital attestations, building atop the foundations offered by the Sigstore project and previous initiatives like Trusted Publishing. This work has left PyPI itself in a stronger position than ever before, but has not yet meaningfully diminished the amount of trust required by package consumers in PyPI. This talk attempts to tackle the latter: it imagines a hypothetical “zero-trust” future for PyPI, and asks which technologies (whether currently practical and not) could get us to that future.

* [Speaker slides](https://yossarian.net/res/pub/transparency-2024.pdf)
* [Talk Recording](https://youtu.be/ZVC9dwmqX2s?si=8xc_EfYbEqbHOc2a)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/sct-auditing.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@ speakerTitle: Cloudflare
A Signed Certificate Timestamp (SCT) is a promise that a Certificate Transparency (CT) log will eventually incorporate a certificate into its public log. This inclusion allows users to account for issued certificates and detect misissued certificates. By default, clients do not check if the log fulfilled the promise given with the SCT, as requesting a proof of inclusion from the log leaks the browsing history to the log. If an SCT is not checked, a sophisticated attacker could serve a bogus certificate that compromises privacy. There are numerous proposals for privacy-preserving SCT auditing, including foregoing the current architecture and switching to a new certificate system.
In this talk we start by giving an update on current deployments and recent developments in SCT auditing proposals. We will follow by covering how SCT auditing could be deployed wider, auditing (almost) all connections either via cryptographic or non-cryptographic strategies. We then discuss a potential scenario where Merkle Tree Certificates (MTC) or a similar system is deployed, which would significantly reduce the number of SCTs that need to be audited: By using MTC, an outdated device may need to fall back to a different certificate system, e.g. X.509, we discuss several scenarios for the fallbacks and their estimated probabilities. We revisit SCT auditing strategies given that our estimates show that less than 0.1% of the connections will require an audit.

* [Speaker Slides]({{< rel "/pdfs/summit2024/heimberger-sct.pdf" >}})
* [Talk Recording](https://youtu.be/f8unMB2Qjho?si=72ClhykaYDHf0sND)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/sigstore.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,9 @@ speakerTitle: Tech Lead Manager at Google, OSS Supply Chain Security

This talk explores the motivations behind signature transparency, the role of transparency in Sigstore identities, and the ongoing improvements we're making to enhance Sigstore's transparency adoption.

* [Speaker Slides]({{< rel "/pdfs/summit2024/Nowhere to Hide - Sigstore.pdf">}})
* [Talk Recording](https://youtu.be/au_nkj0iBj8?si=YSo9C2hFSZyrlnz_)

---

### Speaker
Expand Down
3 changes: 2 additions & 1 deletion content/schedule/sigsum.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,8 @@ makes a signer's key-usage transparent. This talk introduces the design, which
can be used as a building block to transparently publish executable binaries,
reproducibility statements, KT tree heads, configuration files, and much more.

**Speaker slides:** [What is Sigsum and how can I use it for my application?](https://git.glasklar.is/rgdd/tdev-summit-24/-/blob/main/slides.pdf)
* [Speaker slides](https://git.glasklar.is/rgdd/tdev-summit-24/-/blob/main/slides.pdf)
* [Talk Recording](https://youtu.be/Mp23yQxYm2c?si=hhkYjqvWBOgzCDyV)

---

Expand Down
3 changes: 3 additions & 0 deletions content/schedule/talk10.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,9 @@ speakerTitle: Research Engineer, Taurus
<div class="font-google font-medium">

Highly sensitive code managing crypto secrets needs to run in secure environments, often very constrained in capacity. Given these constraints, I will explain how we managed to fit as much logic as possible, as close to the secrets as possible, while also addressing the roles that transparency and verifiability play in ensuring security and trust.

* [Talk Recording](https://youtu.be/qShvsLhSjgs?si=PY5G6Cg65lQVLD5T)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/talk12.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,9 @@ How do I know where my machine learning model came from, and how can I prove it?

We present an open-source specification and implementation to cryptographically sign an arbitrary collection of files which comprise an ML model, to create a mechanism to verify the integrity of a machine learning model to ensure trust between the model producer and end-user. By implementing model signing, we are paving the way for model transparency which helps strengthen the AI supply chain. With this, one could see who has trained the model, what training framework has been used, what datasets were used, and much other useful information.

* [Speaker Slides]({{< rel "/pdfs/summit2024/ML Model Signing.pdf">}})
* [Talk Recording](https://youtu.be/QHOzEkw_9d4?si=Sc0p3IL6Uty861C2)

---

### Speaker
Expand Down
3 changes: 3 additions & 0 deletions content/schedule/tesseratalk.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,9 @@ speakerTitle:

Introducing Trillian Tessera, next-generation tile-based transparency logs

* [Speaker Slides]({{< rel "/pdfs/summit2024/tdev2024_ Tessera.pdf">}})
* [Talk Recording](https://youtu.be/9j_8FbQ9qSc?si=Fh619Ad_n6j4sClF)

---

### Speakers
Expand Down
12 changes: 8 additions & 4 deletions content/schedule/witness.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,14 @@ speakerTitle:

In this focused session, "From Witnessing to Transparent Ecosystems," we will explore the journey from the foundational concept of "witnessing" to the realization of fully transparent, end-to-end ecosystems. Our four talks are structured to interlock seamlessly, providing a holistic view of Witnessing and its broader impact.

* Witnessing & ArmoredWitness overview - Martin Hutchinson
* Using TamaGo to build the ArmoredWitness - Andrea Barisani
* Firmware Transparency for the ArmoredWitness - Al Cutter
* End-to-end transparency from logging to monitoring - Filippo Valsorda
* Witnessing & ArmoredWitness overview - Martin Hutchinson
* Using TamaGo to build the ArmoredWitness - Andrea Barisani
* Firmware Transparency for the ArmoredWitness - Al Cutter
* End-to-end transparency from logging to monitoring - Filippo Valsorda

* [Speaker Slides]({{< rel "/pdfs/summit2024/tdev2024_ ArmoredWitness.pdf">}})
* [Talk Recording Part 1](https://youtu.be/v9cgvZXRRZU?si=IViyJo-1LupkqMSd)
* [Talk Recording Part 2](https://youtu.be/uZXESulUuKA?si=YdJ4n_I8aE-tJ8K_)

---

Expand Down
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added static/pdfs/summit2024/ML Model Signing.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added static/pdfs/summit2024/RuntimeTransparency.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added static/pdfs/summit2024/heimberger-sct.pdf
Binary file not shown.
Binary file not shown.
Binary file added static/pdfs/summit2024/tdev2024_ Opener.pdf
Binary file not shown.
Binary file added static/pdfs/summit2024/tdev2024_ Tessera.pdf
Binary file not shown.

0 comments on commit f69bc06

Please sign in to comment.