File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ different software updaters!)
14
14
What these very different systems have in common is that they all identify,
15
15
locate, and download updates for software that can add new functionalities or
16
16
address old vulnerabilities. Software is rarely ever static, and some repositories
17
- receive updates on software or project metadata [ every few minutes] ( https://ssl.engineering.nyu.edu/ papers/kuppusamy_nsdi_16 .pdf) . This
17
+ receive updates on software or project metadata [ every few minutes] ( / papers/protect-community-repositories-nsdi2016 .pdf) . This
18
18
growing flow of updates has also created a need for better
19
19
ways to protect the systems that manage them. Though a number of strategies have
20
20
been introduced and used over the last decade or so to enhance the
@@ -81,7 +81,7 @@ account, such as when:
81
81
* An attacker compromises the key used to sign these files. Now you
82
82
download a file that is properly signed, but is still malicious.
83
83
84
- The [ Security] ( /security.md ) section offers a full list of the
84
+ The [ Security] ( /security.html ) section offers a full list of the
85
85
attacks and updater weaknesses that TUF is designed to defend against.
86
86
87
87
### How does TUF secure updates? ###
You can’t perform that action at this time.
0 commit comments