minor fixes

This commit is contained in:
Anton Livaja 2025-01-27 02:39:39 -05:00
parent 45969bfbf1
commit eca1e5481d
Signed by: anton
GPG Key ID: 44A86CFF1FDF0E85
6 changed files with 17 additions and 17 deletions

View File

@ -1,4 +1,4 @@
# PGP Key Provisioning
# Quorum PGP Key Provisioning
## Requirements
@ -16,9 +16,9 @@
* For each new key to be provisioned:
* 2 new smart cards
* 2+ new smart cards
* 2 new SD cards
* 2+ new SD cards
## Procedure

View File

@ -26,7 +26,7 @@ The proposer must combine these values into a single message, which can be a sim
## Procedure
1. Define a new file `workflow_inputs_<num>.json`, for example `workflow_inputs_1.json`
1. Define a new file `workflow_payload_<num>.json`, for example `workflow_payload_1.json`
1. Create a new directory in the `ceremonies` repository for the date on which the ceremony for the transaction will take place if it doesn't already exist, for example `2024-01-01/`

View File

@ -8,8 +8,6 @@
* Air-gapped computer
* Ceremony SD Card
## Procedure
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing}}

View File

@ -33,7 +33,3 @@ Only used in ceremonies for decrypting shardfile material.
* MUST not be transferred in level 4
* MAY be transferred in levels 1-3
## Namespace Key
- [ ] TODO define

View File

@ -14,6 +14,14 @@ Individuals who are selected for the roles:
* MUST be reinvestigated once a year to ensure they meet necessary standards to access restricted information
## Provisioner
Responsible for more technical aspects of preparing equipment for ceremonies such as creating air-gapped machines by removing radio cards, and tamper proofing them along with SD cards which are loaded with AirgapOS etc.
## Procurer
Responsible for tasks such as procuring a location, tamper proofing equipment, hardware, and maintaining inventory.
## Proposer
This is an individual who is a business owner or stakeholder, or a financial controller. Their role is to make fiduciary decisions which protect the financial interest of the organization and its clients. Their role is specifically to propose the movement of funds, specifying the amount, origin and destination.

View File

@ -26,19 +26,17 @@ of their security properties
* Creating custom purpose specific tooling which eliminates dependencies in
order to reduce supply chain attacks, and adds desirable security properties
* Using a fully bootstrapped and deterministically built compiler for building
all software that's used
* Building as much of the software and firmware deterministically as possible - aiming for 100%
* Building all of the software and firmware deterministically
* The [StageX](https://codeberg.org/stagex/stagex) project is the effort towards this end
* Using computers which either have a hard switch for disabling networking or
which had radio networking cards (bluetooth, wifi etc.) removed
* Using computers which either have a hard switch for disabling networking or which had radio networking cards (bluetooth, wifi etc.) removed
* Leveraging smart cards (personal HSMs) to protect cryptographic material
* Leveraging sharding in order to physically separate cryptographic material
* Leveraging cryptographic sharding in order to decentralize risk and physically separate cryptographic material
* Leveraging tamper evident controls for components related to the system
* Leveraging tamper evident controls for equipment
* Leveraging frequency blocking methods such as TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions) and soundproofing