-
TD suggests STRIDE when adding threats to the data flow diagram, and one idea is that when one of STRIDE categories is suggested by TD, then the default description could have a link to the specific E…
-
What is the proposed way of handling the endpoint security?
The issues that i am facing are the following:
### POST PUT DELETE Endpoints
From what i've seen in the documentation there is no sec…
-
The spec should address providing integrity and authenticity of dcat files and associated datasets.
As a security matter, it's not clear how authenticity or integrity of metadata files or the assoc…
-
### Discussed in https://github.com/FakeFishGames/Barotrauma/discussions/14658
Originally posted by **A2ur3** September 19, 2024
### Disclaimers
- [X] I have searched the issue tracker to c…
-
An important limitation of the `java.sql.Time` type is that it doesn't really support any precision, neither when calling `Time.valueOf(String)`, nor when calling `Time.valueOf(LocalTime)`:
```java…
-
### OpenTofu Version
```shell
Latest
```
### Use Cases
Some organizations have a distrust of upstream tampering of versions. One way to give peace of mind is by pinning versions to upstream…
-
To allow legal folks to prove data has not been tampered with after download. Files will have a fingerprint generated with a hash of the file content plus a secret defined when creating the hold (hol…
-
If I remove characters from the json of a valid verifiable credential and then try to verify in V+ it still shows as valid.
Here is a valid VC that correctly validates. But, remove any character, s…
-
Create a hash by every log file generated by a test (in the VPS instance or in the local machine) to avoid any tampering with the results. Download both the hash and the log in the same step.
Use …
-
Running an image behind a corporate firewall that hacks the TLS certificate causes "docker run" to fail when pulling the image.
```
docker run -ti ubuntu /bin/bash
Unable to find image 'ubuntu:latest…