From ea0d33fc17ad236cfc3bf8296d4f6a061e1fbff0 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 25 Sep 2023 14:58:30 +0200 Subject: [PATCH] chg: [blog] SACTI broken link fixed --- .../SACTI_Secure_aggregation_of_cyber_threat_intelligence.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/blog/SACTI_Secure_aggregation_of_cyber_threat_intelligence.md b/content/blog/SACTI_Secure_aggregation_of_cyber_threat_intelligence.md index 9e1ee1a4..5fe48577 100644 --- a/content/blog/SACTI_Secure_aggregation_of_cyber_threat_intelligence.md +++ b/content/blog/SACTI_Secure_aggregation_of_cyber_threat_intelligence.md @@ -51,11 +51,11 @@ The solution is secure in the semi-honest model; this means that participants ar The demonstrator is built in Python using the Shamir secret-sharing library from mpc.tno.nl. The, code, installation instructions and usage instructions can be found [here](https://github.com/COSSAS/sacti). Further backgrounds (including a demonstration video) can be found [here](https://cossas-project.org/portfolio/sacti/). -Since the software was developed within the EU's [Prometheus](h2020.prometheus.eu) project, the PKI in the demonstrator is self-made and based on lattice-based standardization candidates from NIST's PQC standardization competition. However, it is not suitable for operational applications. It is only suitable for simulation on one machine and for research purposes. Organizations using this protocol should replace it with a properly implemented and tested PKI. +Since the software was developed within the EU's [Prometheus](https://h2020.prometheus.eu) project, the PKI in the demonstrator is self-made and based on lattice-based standardization candidates from NIST's PQC standardization competition. However, it is not suitable for operational applications. It is only suitable for simulation on one machine and for research purposes. Organizations using this protocol should replace it with a properly implemented and tested PKI. Nonetheless, presented software can be used to get acquainted with the ideas behind SACTI. The performance of SACTi does not rely significantly on the used cryptography. Furthermore, we have attempted to write the software in such a way that a transition to a distributed run is relatively straightforward. -If you would like to get in touch with us about SACTI, we can be reached via our [Slack channel](cossas.slack.com). +If you would like to get in touch with us about SACTI, we can be reached via our [Slack channel](https://cossas.slack.com). # Performance