
Introducing 3TOFU -- a Harm-Reduction process to Supply Chain Security when downloading software that cannot be verified cryptographically

Supply Chain Security Harm Reduction with 3TOFU
Introducing 3TOFU -- a Harm-Reduction process to Supply Chain Security when downloading software that cannot be verified cryptographically
By Michael Altfield
License: CC BY-SA 4.0
https://tech.michaelaltfield.net/
This article introduces the concept of 3TOFU - a harm-reduction process when downloading software that cannot be verified cryptographically.
![]() |
---|
Verifying Unsigned Releases with 3TOFU |
⚠ NOTE: This article is about harm reduction.
It is dangerous to download and run binaries (or code) whose authenticity you cannot verify (using a cryptographic signature from a key stored offline). However, sometimes we cannot avoid it. If youre going to proceed with running untrusted code, then following the steps outlined in this guide may reduce your risk.