Going to keep the doc in a "simple" form for now, with the intention of circling back and making it more general down the road.
@scjudd basically the whole body of documents depends on roles. This document is meant to specify what these roles are in a more clear manner, and this doc will be linked to by a number of other…
- It's essentially done
- It's to be reviewed by another team member to ensure that it's not missing anything
Going to integrate the CCSS documentation with our threat model and reorganize information. The goal is to have different "aspects" such as "entropy generation", and then all levels specified for…
This document should be replicated, updated and used as the high level threat model, which can be linked to, and links to other documents such as "tamper proofing methods", "chain of custody",…
There is a challenge with SOL transactions because they are only valid for 250 blocks from the hash which was used to generate the tx. Solana processes 2.5 blocks a second, which means we have a…
Currently working on the fixed location tamper evident path. This is the happy path, and the most secure one. The flow will differ primarily in terms of the location, hardware and tamper evidence.
Using polaroid + digital camera offers an analog and digital option, adding additional resiliency to the system