-
### Session description
When a standard is written, it's required to write Security and Privacy Considerations and, if the technology is particularly disruptive, to sample the human rights impact.
O…
-
We should have a document describing the intended threat model that liboqs aims to be secure against. This would include issues such as constant time behaviour, and what is in or out of scope, such as…
-
[//]: # (REMBEMBER! Add links to things related to the bug using for example:)
[//]: # (https://www.wowhead.com/wotlk)
**Description:**
https://www.wowhead.com/wotlk/npc=16028/patchwerk#comment…
-
As part of the fuzzing discussion, it would be helpful to have threat modeling done for the various OTel components. This issue is to track any work that could be done to progress this.
-
Hi Lei,
I just came across your RIBLT paper and for the most part I thought it was compelling and clear, and the scheme described has tremendous potential. However, I believe it contains a misunder…
-
Create Threat Model guide
-
## Description
The security and threat modeling of the app must be ensured and approved by the security team.
- [ ] Contact to the serurity team: @RoKrish14 and @szymonkowalczykzf to align with t…
-
A key vault is a service that can be used to manage keys needed to encrypt/decrypt data. They can improve data security by removing the need for a process that needs to send/save encrypted output or r…
-
Here I want to brainstorm a list to what are all the potential threats (i.e., where can things go wrong) to a machine learning project? Our checklist need not address all of them, but we should in our…
-
@simoneonofri noticed that we don't have a home at the W3C for general web threat modeling. He tried to address this by creating https://www.w3.org/community/tmcg/, but my personal sense is that this …