Google Developers2.4 млн
Опубликовано 12 января 2016, 21:32
Brillo has a defense-in-depth strategy to device security built around verified boot, software fault isolation, and field updates of devices. Paul Covell explains the architecture of each of these mechanisms and how they work together to help Brillo devices be more resistant to exploit and create mechanisms for recovery if an exploit occurs.
Watch more talks from Ubiquity Dev Summit here: goo.gl/FS9v3U
Subscribe to the Google Developers channel at goo.gl/mQyv5L
Music by Terra Monk: terramonk.com
Watch more talks from Ubiquity Dev Summit here: goo.gl/FS9v3U
Subscribe to the Google Developers channel at goo.gl/mQyv5L
Music by Terra Monk: terramonk.com
Случайные видео