Join us

ContentUpdates and recent posts about Sigstore..
News FAUN.dev() Team Trending
@kala shared an update, 2 weeks, 6 days ago
FAUN.dev()

DeepSeekMath-V2 Launches with 685B Parameters - Dominates Math Contests

DeepSeekMath-V2

DeepSeekMath-V2, an AI model with 685 billion parameters, excels in mathematical reasoning and achieves top scores in major competitions, now available open source for research and commercial use.

DeepSeekMath-V2 Launches with 685B Parameters - Dominates Math Contests
Link
@anjali shared a link, 2 weeks, 6 days ago
Customer Marketing Manager, Last9

9 Monitoring Tools That Deliver AI-Native Anomaly Detection

A technical guide comparing nine observability platforms built to detect anomalies and support modern AI-driven workflows.

anamoly_detection
 Activity
@kala added a new tool DeepSeekMath-V2 , 2 weeks, 6 days ago.
News FAUN.dev() Team Trending
@kala shared an update, 2 weeks, 6 days ago
FAUN.dev()

A New Challenger: INTELLECT-3's 100B Parameters Punch Above Their Weight

Ansible Slurm Lustre INTELLECT-3

INTELLECT-3, a 100B+ parameter model, sets new benchmarks in AI, with open-sourced training components to foster research in reinforcement learning.

A New Challenger: INTELLECT-3's 100B Parameters Punch Above Their Weight
 Activity
@kala added a new tool INTELLECT-3 , 2 weeks, 6 days ago.
 Activity
@devopslinks added a new tool Lustre , 2 weeks, 6 days ago.
 Activity
@varbear added a new tool Slurm , 2 weeks, 6 days ago.
Course
@eon01 published a course, 2 weeks, 6 days ago
Founder, FAUN.dev

Cloud Native CI/CD with GitLab

GitLab GitLab CI/CD Helm Prometheus Docker GNU/Linux Kubernetes

From Commit to Production Ready

Cloud Native CI/CD with GitLab
Course
@eon01 published a course, 3 weeks, 1 day ago
Founder, FAUN.dev

Observability with Prometheus and Grafana

Prometheus Docker k3s Grafana GNU/Linux Kubernetes

A Complete Hands-On Guide to Operational Clarity in Cloud-Native Systems

Observability with Prometheus and Grafana
Course
@eon01 published a course, 3 weeks, 2 days ago
Founder, FAUN.dev

Cloud-Native Microservices With Kubernetes - 2nd Edition

Helm Jaeger OpenTelemetry Prometheus Docker Grafana Loki Grafana Kubernetes Kubectl

A Comprehensive Guide to Building, Scaling, Deploying, Observing, and Managing Highly-Available Microservices in Kubernetes

Cloud-Native Microservices With Kubernetes - 2nd Edition
Sigstore is an open source initiative designed to make software artifact signing and verification simple, automatic, and widely accessible. Its primary goal is to improve software supply chain security by enabling developers and organizations to cryptographically prove the origin and integrity of the software they build and distribute.

At its core, sigstore removes many of the traditional barriers associated with code signing. Instead of managing long-lived private keys manually, sigstore supports keyless signing, where identities are issued dynamically using OpenID Connect (OIDC) providers such as GitHub Actions, Google, or Microsoft. This dramatically lowers operational complexity and reduces the risk of key compromise.

The sigstore ecosystem is composed of several key components:

- Cosign: A tool for signing, verifying, and storing signatures for container images and other artifacts. Signatures are stored alongside artifacts in OCI registries, rather than embedded in them.

- Fulcio: A certificate authority that issues short-lived X.509 certificates based on OIDC identities, enabling keyless signing.

- Rekor: A transparency log that records signing events in an append-only, tamper-evident ledger. This provides public auditability and detection of suspicious or malicious signing activity.

Together, these components allow anyone to verify who built an artifact, when it was built, and whether it has been tampered with, using publicly verifiable cryptographic proofs. This aligns closely with modern supply chain security practices such as SLSA (Supply-chain Levels for Software Artifacts).

sigstore is widely adopted in the cloud-native ecosystem and integrates with tools like Kubernetes, container registries, CI/CD pipelines, and package managers. It is commonly used to sign container images, Helm charts, binaries, and SBOMs, and is increasingly becoming a baseline security requirement for production software delivery.

The project is governed by the OpenSSF (Open Source Security Foundation) and supported by major industry players.