C2SP VS sigsum

Compare C2SP vs sigsum and see what are their differences.

C2SP

Community Cryptography Specification Project (by C2SP)

sigsum

Mirror only. Official repository is at https://git.glasklar.is/sigsum/project/documentation (by sigsum)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
C2SP sigsum
15 3
236 4
8.1% -
7.4 8.9
about 1 month ago 7 days ago
Python TeX
GNU General Public License v3.0 or later Creative Commons Attribution Share Alike 4.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

C2SP

Posts with mentions or reviews of C2SP. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-15.

sigsum

Posts with mentions or reviews of sigsum. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-15.
  • Sunlight, a Certificate Transparency log implementation
    5 projects | news.ycombinator.com | 15 Mar 2024
    Exactly! It's a growing ecosystem including things like https://transparency.dev, the Go Checksum Database, https://www.sigsum.org, SigStore, and even key transparency solutions like WhatsApp's.

    One thing you end up needing to deploy tlogs is a way to reassure clients the tree is not forked, and for that you mostly need witness cosigning, where a quorum of third parties attest that a signed tree head is consistent with all the other ones they've seen. I've worked with the Sigsum project and the Google TrustFabric team on an interoperable specification for witnessing (which Sunlight interoperates with), and I am now working to develop a public, reliable ecosystem of witnesses.

    Once you have witnessing, running a log can be as easy as hosting a few files in a GitHub repo or S3 bucket, updated with a batch script. I am very excited to make it possible for any project to get better-than-CT accountability for ~free.

    (You might want to catch my RWC 2024 talk about this once it comes out!)

  • Mullvad on Tailscale: Privately browse the web
    3 projects | news.ycombinator.com | 7 Sep 2023
    > one of the ways you can evaluate companies is to recognize when they're making sketchy, not-relevant claims to create an air of legitimacy.

    This is an excellent heuristic. Personally I like to evaluate trustworthiness in terms of integrity and competence - can I trust their values and can I trust that they know what they are doing? Words are cheap of course. Consistent action across several years is much harder to fake. It also overlaps with another heuristic I use to model and predict the behaviour of a company; a company's behaviour will converge on the shareholders' goals over time.

    > This "our servers have no disks" thing is kind of thing is marketing.

    You are correct that we considered that aspect while writing the blog post, but please read the content before passing judgement. See the section titled "To recap about “no disks in use”" in particular.

    On the topic of "air of legitimacy" I'll just leave these here:

    * Our apps have been open-source since we launched in 2009

    * Our response to Shellshock: https://news.ycombinator.com/item?id=8385332

    * Our thoughts on WireGuard in 2017: https://mullvad.net/en/blog/2017/9/27/wireguard-future/

    * Experimental post-quantum KEM support in 2017: https://mullvad.net/en/blog/2017/12/8/introducing-post-quant...

    The blog post you commented on also talks extensively about how it was one of our first steps in making our infrastructure transparent. Here are just two things we've done as part of that project:

    * "This is the first time a modern off-the-shelf server platform gains coreboot support, and it is an integral part of realizing our vision of transparent and independently auditable VPN servers." - https://mullvad.net/en/blog/2019/8/7/open-source-firmware-fu...

    And finally, we've spent 2-3 years designing a transparency log with distributed trust assumptions. One of many critical parts necessary to achieve our vision of transparent server infrastructure. I'll wager that there's no transparency log with a stronger threat model than ours. https://www.sigsum.org

    We're certainly not without fault, but hopefully this helps inform your opinion of Mullvad.

    Best regards,

  • Sigsum vs. Sigstore a frequently asked question
    1 project | news.ycombinator.com | 18 May 2022

What are some alternatives?

When comparing C2SP and sigsum you can also consider the following projects:

sops - Simple and flexible tool for managing secrets

headscale - An open source, self-hosted implementation of the Tailscale control server

age.el - Transparent age encryption support for Emacs modeled after EPG/EPA

age - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.

pa - a simple password manager. encryption via age, written in portable posix shell

rage - A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composability.

passage - A fork of password-store (https://www.passwordstore.org) that uses age (https://age-encryption.org) as backend.

age-plugin-yubikey - YubiKey plugin for age