加载中...

Secure and Robust

Sequoia focuses on security and robustness in our choice of tools, our development methodology, and feature set.

Read more.

Easy to Use

A library is only as good as its integration in downstream projects. As such, we made ease of use one of our main goals.

Read more.

Holistic Approach

Improving the security of OpenPGP users requires more than a new implementation. Therefore, we are taking a holistic approach and are improving the ecosystem.

Read more.

Testimonials

News

Sequoia's Input to the Upcoming European Open Digital Ecosystem Strategy

By Neal H. Walfield on February 3, 2026

The European Commission has requested input to inform the upcoming European Open Digital Ecosystem Strategy. The initiative “will set out: a strategic approach to the open source sector in the EU that addresses the importance of open source as a crucial contribution to EU technological sovereignty, security and competitiveness” and “a strategic and operational framework to strengthen the use, development and reuse of open digital assets within the Commission.”

The following text is our submission. In our response, we highlight issues with the status quo. In particular, we criticize the dominance of American mega-corporations and suggest an alternative approach where no company is too large to fail, we discuss how proprietary software inhibits sovereignty and security and FOSS enables it, and we call for a significant investment in FOSS in the form of something like the proposed EU Sovereign Tech Fund, and the creation of an IT support ecosystem for consumers of FOSS.

Continue reading

Thoughts on To Sign or Not to Sign

By Neal H. Walfield on January 12, 2026

39C3, the annual meeting of the Chaos Computer Club (CCC), included a presentation called To sign or not to sign: Practical vulnerabilities in GPG & friends. In their presentation, the security researchers discuss the vulnerabilities that they found in GnuPG, Sequoia, age and minisign. The talk is impressive not the least for the shear number of vulnerabilities (14!) that they found, but also their breadth. They range from buffer overflows, to the use of uninitialized memory, to improper input validation.

In this blog post, I will take a look at the attack that the researchers claim demonstrates a security weakness in Sequoia, and consider its possible impact. In my estimation, this characterization is primarily due to a literal translation of gpg invocations to sq invocations, and the user ignoring sq’s output. As the user is following a recipe, a more realistic analysis should have considered a less naive translation that uses sq’s standard workflows, which would have prevented the attack. That said, the security researchers identify an issue that raises legitimate concerns, and the ecosystem as a whole needs to improve to better protect users.

Continue reading

Presentations

Do you want to see more?

There are a number of projects under the Sequoia umbrella.

Projects