Awn Umar

Technology
22 July 2024
How we securely generate sensitive secrets
We regularly have to create and manage secrets that grant very sensitive privileges, and so we’ve created a new process that makes it fast and easy for us to securely and verifiably perform all kinds of sensitive operations.
![[Blogpost] Security data 01](https://images.ctfassets.net/ro61k101ee59/3R0SDFLI8gHZqmJHLq2d2y/76b41d5ffeb77c2f55f0ce8bdef12cff/_Blogpost__Security_data_01.png?w=2501&q=75)
Technology
Security
15 February 2022
Securely delegating trust with digital signatures and secret storage systems
This post explains how our public key infrastructure uses a combination of different secret storage systems to implement a balance between security assurances and usability.