From 4c3543f175252fae9ae48ac8f6accca207eeed8d Mon Sep 17 00:00:00 2001 From: elijah Date: Thu, 22 May 2014 15:26:49 -0700 Subject: fix link to TUF security page. --- docs/tech/hard-problems/en.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/tech/hard-problems/en.md b/docs/tech/hard-problems/en.md index acd99c4..c419006 100644 --- a/docs/tech/hard-problems/en.md +++ b/docs/tech/hard-problems/en.md @@ -152,6 +152,6 @@ The sad state of update security is especially troublesome because update attack To address the update problem, LEAP is adopting a unique update system called Thandy from the Tor project. Thandy is complex to manage, but is very effective at preventing known update attacks. -Thandy, and the related [TUF](https://updateframework.com), are designed to address the many [security vulnerabilities in existing software update systems](https://updateframework.com/projects/project/wiki/Docs/Security). In one example, other update systems suffer from an inability of the client to confirm that they have the most up-to-date copy, thus opening a huge vulnerability where the attacker simply waits for a security upgrade, prevents the upgrade, and launches an attack exploiting the vulnerability that should have just been fixed. Thandy/TUF provides a unique mechanism for distributing and verifying updates so that no client device will install the wrong update or miss an update without knowing it. +Thandy, and the related [TUF](https://updateframework.com), are designed to address the many [security vulnerabilities in existing software update systems](https://github.com/theupdateframework/tuf/blob/develop/SECURITY.md). In one example, other update systems suffer from an inability of the client to confirm that they have the most up-to-date copy, thus opening a huge vulnerability where the attacker simply waits for a security upgrade, prevents the upgrade, and launches an attack exploiting the vulnerability that should have just been fixed. Thandy/TUF provides a unique mechanism for distributing and verifying updates so that no client device will install the wrong update or miss an update without knowing it. Related to the update problem is the backdoor problem: how do you know that an update does not have a backdoor added by the software developers themselves? Probably the best approach is that taken by [Gitian](https://gitian.org/), which provides a "deterministic build process to allow multiple builders to create identical binaries". We hope to adopt Gitian in the future. -- cgit v1.2.3