diff --git a/content/en/docs/project/history.md b/content/en/docs/project/history.md index ac3ba79..fe88c23 100644 --- a/content/en/docs/project/history.md +++ b/content/en/docs/project/history.md @@ -32,7 +32,13 @@ four core principles continue to be central to its design. hackers can not sign metadata to authenticate malware. - Lastly, TUF keeps the most vulnerable signing keys offline, which greatly - reduces the risk that they can be stolen or compromised. In 2016, the TUF - research group set up a process whereby the community could + reduces the risk that they can be stolen or compromised. + +In 2016, the TUF research group set up a process whereby the community could +have input on technical issues. Named the TUF Augmentation Proposal, or TAP, +this series of documents also provide information to the TUF community, or +describe new feature for TUF or its processes or environment. Through the use of +TAPs, as well as input from those who adopted the technology, the evolution of +TUF technology can continue as security needs change. [paper]: /papers/survivable-key-compromise-ccs2010.pdf