Awn Umar

How we securely generate sensitive secrets
We regularly have to create and manage secrets that grant very sensitive privileges, and so we’ve created a new process that makes it fast and easy for us to securely and verifiably perform all kinds of sensitive operations.

Securely delegating trust with digital signatures and secret storage systems
This post explains how our public key infrastructure uses a combination of different secret storage systems to implement a balance between security assurances and usability.