-
https://www.w3.org/TR/2024/WD-controller-document-20240817/#context-injection
The sentence "If an `@context` property is not provided in a document that is being secured or verified, or the Data Inte…
-
does securing Terror strike counts as harming (for the purpose of the Truce Law)
[Terror Strike](https://cards.ledergames.com/card/ARCS-F621?q=terror%20strike)
- [ ] F620
- [ ] F621
-
https://staging.a-cup-of.coffee/blog/yubikey/
Let's discover together how to use GPG to secure your exchanges (files, emails, commits) and how to store your keys on a Yubikey for added security!
qjoly updated
3 weeks ago
-
Issue: securing iPhone 14 (iOS 17.5)
Problem: being hacked by hacker utilising suspected Mobile forensics software.
Solution proposed: software for iPhone to prevent unauthorised infiltration by mob…
-
Hi sir,
I've been implementing NIP-29 groups in 0xchat and noticed some changes in relay29. Thank you for the updates! 🙏
However, I encountered an issue during group creation. Currently, groups …
-
this is not urgent, but Securing Mechanisms section could be organized clearer I think. some thoughts:
- I think sd-bls uses data integrity, so should be moved to embedded
- would really encourage…
-
### Problem
Confidential containers use kata to deploy and run containers in confidential VMs. This approach protects container workloads against privileged software and malicious administrators o…
-
Re-opening #6196 as it is still relevant.
All details are identical. Not using ManagedCertificate
-
## Problem
This is not valid in some distros Such as Ubuntu 22.10 and up, because use SSH sockets
Also is not valid for distros Redhat Based with Selinux activate.
## Suggested Fix
Explain this in…
-
- [x] I have read the [CLA Document](https://github.com/creator-assertions/identity-assertion/blob/main/contributor-license.md) and I hereby sign the CLA.
--------------------------------------…