-
VSecM high-trust mode: Use a PKCS#11 interface to store VSecM root keys in a hardware security module and keep secrets encrypted (even in memory). When a workload requires a secret VSecM safe will use…
-
Please add clear warning that this is for educational purpose, should not be used with real wealthy addresses. Input your private keys in this software is pretty hazardous.
For example, there's a c…
-
### Preliminary checklist
- [X] I have read the [README](https://github.com/uazo/cromite/blob/master/README.md)
- [X] I have searched [existing issues](https://github.com/uazo/cromite/issues) for …
-
# Quex Technologies
## Project Description
During this grant period, we're going to implement Q-oracle - a pull-based oracle system capable of securely fetching and verifying data from any web s…
-
**Requested feature**
Change enclave shutdown conditions to make the shutdown command more secure.
A way to do that would be to specify who can issue that command or shutdown the enclave after a tim…
-
I read your another work "federated xgboost", which stated that it does not support differential privacy. If I implement this work in a distributed system, can it be considered federated?
-
Whilst reviewing the UIA Proxy for LDAP injection, I noticed that OpenLDAP uses SSHA for password hashing with SHA1 which is non-ideal. SHA-1 is fast to compute and should not be used for storing pass…
-
### Contact Details
kasper.lange@nelen-schuurmans.nl
### Topdesk URL (API)
https://nelen-schuurmans.topdesk.net/tas/secure/contained/incident?unid=55bb3224-c68c-4ef9-b58b-5162209d95b3
### Incident…
-
how mozilla rr works? see: https://rr-project.org/rr.html#99.0
-
Can this library receive hex or base64 as input into the hash?
Can this library perform HMAC using the SHA3 algorithm? I would like to do HMAC(key, message) with perhaps either or both parameters as …