-
Introduction: [What you need to know about container security](https://techbeacon.com/enterprise-it/container-security-what-you-need-know-about-nist-standards)
----
- [ ] Develop a checklist for …
-
When/if we have signatures, should discuss when/how they should be used. Could be added to the "object security" section (signatures basically provide object security for metadata). Object securit…
-
I believe we have poor definitions for configuration and state.
We define configuration as non-volatile endpoint attributes and state as volatile endpoint attributes. This feels dissatisfying. I wo…
-
This is a tracking issue for incorporating Hardware Attested Platforms, aka Trusted Computing into SLSA. The main idea is to provide greater trust in the build by using trusted computing features like…
-
I created a keybase team and added a bunch of people to it. Everything was working great until I lost my Yubikey, and reset my Keybase account to protect myself. Now some commands report I'm not a mem…
-
**Description**
When the window of WinUI application (that has SKCanvasView inside it) is constantly resized the scale of the canvas drawing does not look accurate for some of the frames. That leaves…
-
Nomad client agents [must be run as root](https://www.nomadproject.io/docs/install/production/requirements#linux-capabilities). The notion of "rootless" containers has worked its way through the conta…
-
Hey.
it came up during the workshop that dcache.org may provide a APT repo with the dCache packages,...
Let's use this ticket to collect ideas for this.
1) Software:
There are several software syste…
-
StreisandEffect/streisand#1142 suggests adding the V2Ray suite as a service. I've asked @baimafeima to chime in with more information; if it works better against the usual Streisand threat model, it c…
-
In the last WebThings monthly public meeting multiple people (myself included) expressed an interest in adding touch screen controller software to WebThings. There have also been many requests to add …