You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In such a scenario: A remote server (untrusted) claims that he provide a service in a trusted container, which is created by a public trusted image and isolated by kata-container and is running in a read-only mode (so that nobody can modify the container). However, as a user of this container, how can I validate this container? Specifically, when I connect to this container, how can I check if this container is really isolated by kata-container and really come from a trusted image?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
In such a scenario: A remote server (untrusted) claims that he provide a service in a trusted container, which is created by a public trusted image and isolated by kata-container and is running in a read-only mode (so that nobody can modify the container). However, as a user of this container, how can I validate this container? Specifically, when I connect to this container, how can I check if this container is really isolated by kata-container and really come from a trusted image?
Beta Was this translation helpful? Give feedback.
All reactions