<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Signing on Pi Stack</title><link>https://www.pistack.xyz/tags/signing/</link><description>Recent content in Signing on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/signing/index.xml" rel="self" type="application/rss+xml"/><item><title>Self-Hosted Supply Chain Security: Sigstore/Cosign vs Notation vs in-toto 2026</title><link>https://www.pistack.xyz/posts/2026-04-21-self-hosted-supply-chain-security-cosign-notation-intoto-2026/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-21-self-hosted-supply-chain-security-cosign-notation-intoto-2026/</guid><description>&lt;p>Software supply chain attacks have grown exponentially in recent years. Compromised packages, tampered container images, and unauthorized code modifications threaten every organization that builds and deploys software. Self-hosted supply chain security tools give you full control over artifact signing, verification, and provenance — without trusting third-party SaaS platforms.&lt;/p></description></item></channel></rss>