WordPress content, cryptographically provable.

Proof of original publication
Proof of timestamp
Proof of anchoring immutable external audit trail
Proof of authorship
Proof of tampering

πŸ”œ Proof of redistribution lineage β€” forensic watermarking (coming soon)

https://wordpress.org/plugins/archiviomd/

#WordPress #ContentIntegrity #Cryptography #Sigstore #OpenSource #Compliance #FOSS

ArchivioMD

Cryptographic content integrity for WordPress. Hashing, HMAC, Ed25519 signing, RFC 3161 timestamps, Rekor transparency log, and compliance exports.

WordPress.org

#SigStore / #PyPI attestations: #PGP is hard! We must invent a new signing scheme that's so much easier on users.

The tools, after I've spent hours *integrating* them into #Gentoo, and getting them working for everything before:
* Verifying google_auth-2.46.0.tar.gz ...
Provenance signed by a Google Cloud account, but no service account provided; use '--gcp-service-account'

Yeah, I'm sure that's *so much simpler* than PGP.

#security

FluxCD OCI Artifact Verification

Kia Ora and Happy New Year! πŸ‡³πŸ‡ΏπŸŽ‰πŸŽ† Thank you for stopping by.

Caleb Woodbine
FluxCD OCI Artifact Verification

Kia Ora and Happy New Year! πŸ‡³πŸ‡ΏπŸŽ‰πŸŽ† Thank you for stopping by.

Caleb Woodbine

For the last couple of weeks, I've been deep diving into container supply chain security.

I built a full GitHub Actions demo pipeline:

β€’ Vulnerability scanning

β€’ SBOM generation

β€’ Keyless signing + attestations

β€’ SLSA build provenance

The stack: Trivy, Syft, Cosign, and Sigstore.

Zero long-lived secrets. GitHub Actions uses OIDC to obtain a short-lived certificate, signs the image (and publishes attestations), and records everything in a public transparency log. No keys to rotate or leak.

The post also covers hardened base images (distroless and Docker's new Hardened Images) and how to enforce signatures on the consumer side with Kubernetes admission policies.

Blog + companion repo to fork: https://lnkd.in/gtdNYWW8

#SupplyChainSecurity #SBOM #Sigstore #GitHubActions #DevSecOps #ZeroTrust

Recently moved to exclusively using OCI for deploying through FluxCD.

For when I need Helm, I’m vendoring packages and syncing them to an OCI registry.

Utilising Sigstore, every OCI image is signed in CI and verified by FluxCD via the verify config in OCIRepository resources.

Very both boring and yet exciting changes!

#fluxcd #kustomize #helm #kubernetes #cncf #homelab #sigstore

. For public repositories, attestations generated on GitHub Actions will be written to the #Sigstore Public Good Instance for verification in public on an immutable ledger. For private repositories on #GitHub Enterprise plans, the attestations are written to an internal, completely private database and no information is written to public ledgers or logs.
https://github.blog/news-insights/product-news/introducing-artifact-attestations-now-in-public-beta/
Introducing Artifact Attestations–now in public beta

Generate and verify signed attestations for anything you make with GitHub Actions.

The GitHub Blog

OpenSSF-funded improvements to Sigstore’s rekor-monitor are making transparency logs easier to monitor for malicious package releases and identity misuse.

Great work by @trailofbits, with support from the sigstore maintainer community including Hayden Blauzvern and @mihaimaruseac.

πŸ”— https://openssf.org/blog/2025/12/19/catching-malicious-package-releases-using-a-transparency-log/

#OpenSourceSecurity #sigstore #SupplyChainSecurity

πŸ’‘ OpenSSF Project Highlight: Sigstore - A Wax Seal of Security for the Digital Era

❓ Why this matters: the Sigstore project is building a modern, transparent trust layer for open source.

Watch this interview and learn more about #Sigstore: https://youtu.be/m5eTw4x33kU?si=JFY3C81VFjBhNIML

Sigstore: A Wax Seal of Security for the Digital Era | OpenSSF Project Spotlight

YouTube

πŸŽ‰ The new #Sigstore Rekor transparency log public dataset is now available on BigQuery!

This dataset makes it easier for researchers to analyze software signing trends & understand how artifacts are signed across the open source ecosystem.

πŸ”—Read: https://openssf.org/blog/2025/10/15/announcing-the-sigstore-transparency-log-research-dataset/