From cedbb275bd941004326805749cf9515a02155f2d Mon Sep 17 00:00:00 2001 From: Patrice Chalin Date: Mon, 11 Nov 2024 11:38:18 -0500 Subject: [PATCH] Recover missing text from history page --- content/en/docs/project/history.md | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/content/en/docs/project/history.md b/content/en/docs/project/history.md index ac3ba79..fe88c23 100644 --- a/content/en/docs/project/history.md +++ b/content/en/docs/project/history.md @@ -32,7 +32,13 @@ four core principles continue to be central to its design. hackers can not sign metadata to authenticate malware. - Lastly, TUF keeps the most vulnerable signing keys offline, which greatly - reduces the risk that they can be stolen or compromised. In 2016, the TUF - research group set up a process whereby the community could + reduces the risk that they can be stolen or compromised. + +In 2016, the TUF research group set up a process whereby the community could +have input on technical issues. Named the TUF Augmentation Proposal, or TAP, +this series of documents also provide information to the TUF community, or +describe new feature for TUF or its processes or environment. Through the use of +TAPs, as well as input from those who adopted the technology, the evolution of +TUF technology can continue as security needs change. [paper]: /papers/survivable-key-compromise-ccs2010.pdf