sigsum

Mirror only. Official repository is at https://git.glasklar.is/sigsum/project/documentation (by sigsum)

Sigsum Alternatives

Similar projects and alternatives to sigsum

  • headscale

    An open source, self-hosted implementation of the Tailscale control server

  • C2SP

    15 sigsum VS C2SP

    Community Cryptography Specification Project

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • sunlight

    A Certificate Transparency log implementation and monitoring API designed for scalability, ease of operation, and reduced cost.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better sigsum alternative or higher similarity.

sigsum reviews and mentions

Posts with mentions or reviews of sigsum. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-15.
  • Sunlight, a Certificate Transparency log implementation
    5 projects | news.ycombinator.com | 15 Mar 2024
    Exactly! It's a growing ecosystem including things like https://transparency.dev, the Go Checksum Database, https://www.sigsum.org, SigStore, and even key transparency solutions like WhatsApp's.

    One thing you end up needing to deploy tlogs is a way to reassure clients the tree is not forked, and for that you mostly need witness cosigning, where a quorum of third parties attest that a signed tree head is consistent with all the other ones they've seen. I've worked with the Sigsum project and the Google TrustFabric team on an interoperable specification for witnessing (which Sunlight interoperates with), and I am now working to develop a public, reliable ecosystem of witnesses.

    Once you have witnessing, running a log can be as easy as hosting a few files in a GitHub repo or S3 bucket, updated with a batch script. I am very excited to make it possible for any project to get better-than-CT accountability for ~free.

    (You might want to catch my RWC 2024 talk about this once it comes out!)

  • Mullvad on Tailscale: Privately browse the web
    3 projects | news.ycombinator.com | 7 Sep 2023
    > one of the ways you can evaluate companies is to recognize when they're making sketchy, not-relevant claims to create an air of legitimacy.

    This is an excellent heuristic. Personally I like to evaluate trustworthiness in terms of integrity and competence - can I trust their values and can I trust that they know what they are doing? Words are cheap of course. Consistent action across several years is much harder to fake. It also overlaps with another heuristic I use to model and predict the behaviour of a company; a company's behaviour will converge on the shareholders' goals over time.

    > This "our servers have no disks" thing is kind of thing is marketing.

    You are correct that we considered that aspect while writing the blog post, but please read the content before passing judgement. See the section titled "To recap about “no disks in use”" in particular.

    On the topic of "air of legitimacy" I'll just leave these here:

    * Our apps have been open-source since we launched in 2009

    * Our response to Shellshock: https://news.ycombinator.com/item?id=8385332

    * Our thoughts on WireGuard in 2017: https://mullvad.net/en/blog/2017/9/27/wireguard-future/

    * Experimental post-quantum KEM support in 2017: https://mullvad.net/en/blog/2017/12/8/introducing-post-quant...

    The blog post you commented on also talks extensively about how it was one of our first steps in making our infrastructure transparent. Here are just two things we've done as part of that project:

    * "This is the first time a modern off-the-shelf server platform gains coreboot support, and it is an integral part of realizing our vision of transparent and independently auditable VPN servers." - https://mullvad.net/en/blog/2019/8/7/open-source-firmware-fu...

    And finally, we've spent 2-3 years designing a transparency log with distributed trust assumptions. One of many critical parts necessary to achieve our vision of transparent server infrastructure. I'll wager that there's no transparency log with a stronger threat model than ours. https://www.sigsum.org

    We're certainly not without fault, but hopefully this helps inform your opinion of Mullvad.

    Best regards,

  • Sigsum vs. Sigstore a frequently asked question
    1 project | news.ycombinator.com | 18 May 2022
  • A note from our sponsor - SaaSHub
    www.saashub.com | 28 Apr 2024
    SaaSHub helps you find the best software and product alternatives Learn more →

Stats

Basic sigsum repo stats
3
4
8.9
6 days ago

sigsum/sigsum is an open source project licensed under Creative Commons Attribution Share Alike 4.0 which is not an OSI approved license.

The primary programming language of sigsum is TeX.

Popular Comparisons


Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com