Red Hat engineers have been working to more securely distribute container images. In this post we look at where we’ve come from, where we need to go, and how we hope to get there.HistoryWhen the Docker image specification was introduced it did not have a cryptographic verification model. The most s…