-
# Describe the bug
I discovered this when completing a tutorial for #554 and attempting to build representation models.
In the current version of the Metaschema syntax of the `has-cardinality` c…
-
> From the introduction:
>
> > In the presence of this adversary, APIs should aim to achieve the following goals:
-Privacy: Clients (and, more specifically, the vendors who distribute the clients) …
-
**Reported by Oleg Artemiev grey olli on 12 Sep 2014 08:14 UTC**
It could be usefull to have a text description for a VM in its
properties to document changes/difference.
https://groups.google.com/d/…
-
On the main screen when I select an entry -> Edit it shows all the info including secret. Why is secret shown? It makes it too easy to peek the secret and make a copy of the token. As I understand 2fa…
-
I have just set up my own self hosted instance (awesome so far!) and like some other users I seek to limit anonymous access in order to prevent abuse.
As I understand it, you can already:
- disa…
vocux updated
3 months ago
-
https://weakdh.org/imperfect-forward-secrecy.pdf
-
Hi,
it would be nice to add 2FA capability to keepasshttp. I recently changed most of my services to 2FA . E.g. my firewall is otp enabled, the credentials comes with keepasshttp, the totp token by…
ghost updated
6 years ago
-
Guardian Set expiration is treated differently on some chains and is also sometimes treated differently on the core bridge vs. Portal Token Bridge, a prominent xApp.
## Expected Behavior
The beha…
-
There should be a way, in the event of a key compromise, to inform contacts that a ricochet id can no longer be trusted.
It looks like there is mention of providing some of the mechanisms around this…
s-rah updated
8 years ago
-
#### Summary
_In case not even the emergency mode allows the network to produce a block, the very last iteration (255) is reserved for a Dusk-signed block that is accepted without any quorum. This …