 So hi everyone, my name is Aasarelli and I'm a software engineer at Google on the Google open source security team. And before this I used to work on Envoy which is another CNCF hosted project and then before that I was working on privacy preserving protocols and I really do love cryptography and math. So about any of those if you wanna talk about that I'm totally happy. So today I'm just gonna quickly wrap up our keynotes and then introduce the rest of the stuff with kind of what I view as what is so amazing about SigStore and why SigStore can move us from like a whole different game and system of securing our supply chain. So I'm kind of gonna give two of the principles that I think are really the core reasons why SigStore is cool and important and not just any old signing tool. Oh yeah, this is totally why. Okay, so the first that I wanna talk about is signing with strong bindings. So as you kind of go throughout the day and you start learning about people's integrations, their tooling and why they're using SigStore I kind of want you to keep this idea in mind about how SigStore provides you with a capability of producing identity-based signatures. So in Priya's demo which was awesome you got to see how Priya binded her identity to or get commit. But it's not just identities like your email or your personality, it's also places like where are you running your code and what is the identity of the place you're actually creating some sort of data. And so with that you kind of get this really interesting and key property of being able to integrate with other sorts of frameworks like Spiffy Spire in order to produce and actually practically achieve a lot of the supply chain security frameworks like Salsa and Fresca in actual practicality. And what I think is kind of crazy is that without this sort of identity-based components a lot of what we're able to do would not have been possible. I like never would have been able to imagine achieving some sorts of high-level Salsa attestations on free platforms without the use of these identity-based signatures. So as the time goes on and like as the day goes on I really encourage you to think like where else can we be using these identity-based signatures? What other sorts of identities can we integrate with? Where can we create some of these attestations and what can we do with them? So the next thing that I wanna talk about is this transparency-first principle. So I really, really love this and also coming from a place of not trusting many people or just being an inherent skeptic. I think the idea of having transparency-first everywhere is a really awesome and cool property that we can start to leverage even more. So what I think is awesome, so this is the RECORE logo if you don't know is that originally a lot of you may have thought RECORE is just there to provide this signature validation property. We're using a lot of these short-lived certificates based on identities and we need a place where we can make sure that the signing events actually occurred during certificate validity. But I don't think it's just that. I think that having a RECORE logo or a transparency log is actually more important than just that. It provides auditability. It provides resilience when you have compromise which inevitably does happen. And it provides a place where you can go and search and discover and validate that all your actions that you've done were actually expected. So I think as time goes on, as the day goes on, as you start to learn about this, try to think of more ways that you can start to leverage this data or more ways that you can start using this maybe even beyond just this short-lived certificate validity. So as we sort of look at this RECORE log, you might be thinking what are we doing with this? How are we going to leverage this? What are we going to do next? So obviously the answer is blockchain. I don't even know how to introduce this but I think the transparency log is an amazing place where we can start leveraging web three. No, no, that is a joke. And I really hope that I can continue to speak at this event and I'm sure many of you realize I'm not actually being serious but what we do start to see is that there are lots of ways that we can start integrating this transparency log information in places like Guac on the right hand. That's a graph of attestations and S-bombs and related material that we start to aggregate and collect. What I think is really cool is that there's this local global mapping that we have if any of your mathematicians, I just wanted to say that but we have this like global view of all these attestations in the world that we're living in now with this local view can use this internally, can use this for fetching a single package and with the ability to kind of view both of those together you get this entire rich set of information that you're able to leverage in all sorts of new ways. So with that, I'm just gonna conclude and thank you all, thank you to Luke and Priya for giving those amazing keynotes. Thank you to the PCs, the organizers, the MCs and everyone here who's able to sort of share their thoughts, their ideas, their contributions and yeah, I'm excited to talk with all of you. So please give me a shout out, please talk to me. Please talk to me about Bitcoin and yeah, thank you.