| ▲ | red_admiral 4 hours ago | |
This is where the whole TPM / trusted computing / secure enclave could be useful to secure developer keys; an unencrypted .ssh/id_rsa file is just too much of a tempting target (also get off RSA already!) | ||
| ▲ | the8472 2 hours ago | parent | next [-] | |
You don't need the secure boot machinery for that though, a hardware security token would do and has the advantage that you need to acknowledge actions with a tap Tangentially, soon all those will be replaced with new hardware supporting PQ signatures. | ||
| ▲ | bob1029 3 hours ago | parent | prev [-] | |
I've started keeping important signing keys in cloud HSM products. Getting AWS KMS to sign a payload is actually very straightforward once you've got your environment variables & permissions set up properly. | ||