How We Secure Builds With fs-verity
We used to do our builds the "normal" way, but we have learned that it wasn't enough...
We've read enough boring blog posts... We promise not to write any ;)
We used to do our builds the "normal" way, but we have learned that it wasn't enough...
I knew that confidential computing added an overhead when running on GPUs, but I never knew it was this absurd...
Upbit was hacked and lost $37M of Solana. Here's how it could have happened and how we could have defend it with eBPF and LSM.
We didn't know it was possible to get GCP credits without a VC
How we secure the runtime of L2 Base Ethereum nodes using eBPF-based policies around JWT secrets, executables, and runtime environment.