Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain

Security Days 2026 Spring Tokyo, Japan
1 / 19
Slide 1 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 2 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 3 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 4 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 5 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 6 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 7 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 8 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 9 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 10 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 11 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 12 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 13 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 14 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 15 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 16 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 17 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 18 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain
Slide 19 of Your Laptop Is Production: Strengthening the Weakest Link in the Software Supply Chain

Abstract

Shai-Hulud style supply chain attacks have shifted compromise from organizations to individual developer environments — making the personal laptop a critical supply chain tier for OSS maintainers. This talk introduces a survivability-first defensive model for single-user environments, focusing on outbound behavior, credential trust boundaries, release workflows, and environmental auditing rather than enterprise-scale controls.

Embed This Presentation

See Also