BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.all-systems-go.io//all-systems-go-2024//ZUFJCM
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-all-systems-go-2024-WWEGGC@cfp.all-systems-go.io
DTSTART;TZID=CET:20240926T151500
DTEND;TZID=CET:20240926T155500
DESCRIPTION:Many Linux distributions rely on cryptographic signatures for t
 heir packages and release artifacts. However\, most of the used signing so
 lutions either do not rely on hardware backed private key material or are 
 run in untrusted environments.\n\nThis presentation will provide a general
  overview of the [Signstar](https://gitlab.archlinux.org/archlinux/signsta
 r/) project\, which is currently under development by Arch Linux to provid
 e a generic signing solution based on a Hardware Security Module (HSM).
DTSTAMP:20260315T023430Z
LOCATION:Main Hall
SUMMARY:Boring infrastructure: Building a secure signing environment - Davi
 d Runge
URL:https://cfp.all-systems-go.io/all-systems-go-2024/talk/WWEGGC/
END:VEVENT
END:VCALENDAR
