Skip to content
View alanssitis's full-sized avatar

Organizations

@in-toto

Block or report alanssitis

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@LeChatP
LeChatP LeChatP
(Eddie BILLOIR) P.h.D Student in SIERA IRIT team

Airbus Protect France

@alex
Alex Gaynor alex
I program computers, and build teams that program computers, with a heavy focus on security.

Anthropic Washington D.C.

@benjojo
Ben Cox benjojo

bgp.tools / Port 179 LTD London

@orhun
Orhun Parmaksız orhun
Terminal Chef at @ratatui | Maintainer at @archlinux btw

@ratatui | @archlinux Ankara, Turkey

@lukpueh
Lukas Pühringer lukpueh
Security Software Engineer

@eclipse Linz, Austria

@gittuf
gittuf gittuf
A security layer for Git repositories
@juxtopposed
Juxtopposed juxtopposed
Observe. Oppose. Upscale.
@puerco
Puerco puerco
@kubernetes SIG Release Technical Lead 🔗 Software Engineer 💡Founder @uservers @carabiner-dev :feather: Prev @mattermost @chainguard-dev @stacklok

@carabiner-dev @uServers

@hackergrrl
Kira hackergrrl
Plants, friends, and P2P tech.

Pacific Northwest

@kpcyrd
kpcyrd
Rust Developer 🦀, {Arch Linux,Debian,Alpine} Package Maintainer 📦, Reproducible Builds Enthusiast ⛓, Security Researcher 🦝, Anarcho Communist 🏴

Never lose the plot Hamburg, Germany

@charmbracelet
Charm charmbracelet
We make the command line glamorous.

/dev/tty

@terminaldotshop
Terminal terminaldotshop
Delicious Brazilian coffee, ethically sourced, and roasted to perfection • Order via your terminal • ssh terminal.shop
@in-toto
in-toto in-toto
A framework to protect software supply chain integrity
@shibumi
Christian Rebischke shibumi
Senior Software Engineer @google

@Google Germany

@Foxboron
Morten Linderud Foxboron
@archlinux developer, security team and reproducible builds. FOSS Developer.

@archlinux / @nrkno Oslo, Norway

@igalfsg
Igal Flegmann igalfsg
Creating a Password-less world by making easy to use and secure cloud based PKI solutions at Keytos | Ex-Microsoft

Keytos Boston

@markeytos
keytos markeytos
Making PKI easy by creating cloud based PKI solutions

Boston

@wlynch
Billy Lynch wlynch

@chainguard-dev New York, NY

@TSELab
TSE Lab TSELab
Trustworthy Software Ecosystems Lab @ Purdue ECE

United States of America

@SBOMit
SBOMit SBOMit
The SBOMit specification is a SBOM format independent method for attesting components with additional verification information.
@adityasaky
Aditya Sirish A Yelgundhalli adityasaky
Software supply chain security researcher and engineer

@bloomberg Brooklyn, NY

@BrendanCReidy
Brendan C Reidy BrendanCReidy
Graduate Research Assistant @ UofSC @iCAS-Lab. Check out my website (first link in bio) for a full overview of my projects and research!
@xclucas
Lucas Chen xclucas
robots and very fast motion planning!

CoMMA Lab

@zghera
Zach Ghera zghera

@Google Sunnyvale, CA

@SantiagoTorres
Santiago Torres SantiagoTorres
Assistant Professor of ECE @ Purdue University working on software supply chain security, applied crypto and systems security

Purdue University Mexico / U.S.