Brillo has a defense-in-depth strategy to device security built around verified boot, software fault isolation, and field updates of devices. Paul Covell explains the architecture of each of these mechanisms and how they work together to help Brillo devices be more resistant to exploit and create mechanisms for recovery if an exploit occurs.
Watch more talks from Ubiquity Dev Summit here:
Subscribe to the Google Developers channel at
Music by Terra Monk:
Watch more talks from Ubiquity Dev Summit here:
Subscribe to the Google Developers channel at
Music by Terra Monk:
- Category
- Tutorials
Sign in or sign up to post comments.
Be the first to comment