Secrets in Cloned Snapshots
Offered By: Linux Plumbers Conference via YouTube
Course Description
Overview
Explore the intricacies of handling secrets in cloned snapshots during this 26-minute conference talk presented at the Linux Plumbers Conference. Delve into the current proposal, examine pseudocode implementations, and understand the challenges associated with checkpointing. Analyze the security implications, discuss systemd interactions, and explore timeout mechanisms for container shutdown. Gain insights into the interfaces involved and evaluate the overall complexity of the proposed solution.
Syllabus
Intro
Choice phase
Current proposal
Pseudocode
Checkpointing
Implementation
The big issue
Not very secure
Systemd
Timeout
Container shutdown
Interfaces
Is it easier
Taught by
Linux Plumbers Conference
Related Courses
Real Time Mesajlaşma UygulamasıUdemy Securely Booting Confidential VMs with Encrypting Disk
Linux Plumbers Conference via YouTube Pressure Feedback for LRU Map Types
Linux Plumbers Conference via YouTube Closing the BPF Map Permission Loophole
Linux Plumbers Conference via YouTube The Revival of the Learning-Sync Bridgeport Flag
Linux Plumbers Conference via YouTube