-
## Description of the problem
https://syslog-ng.github.io/admin-guide/100_TLS-encrypted_message_transfer/004_TLS_options#trusted-keys says it uses SHA-1, and if I understand [the code](https://github…
-
Add access token requirement for strong alg and "None" to mitigating risk of using weak or "none" algorithms to protect tokens
> Verify that, for integrity protected tokens, only strong algorithms…
-
[Trusted Web Activity](https://developers.google.com/web/updates/2017/10/using-twa) was announced at the 2017 Chrome Developer Summit - this provides a WebView-like (i.e. decoration-less) experience f…
-
All sketch endpoints leverage the same http server, one can use SNI to verify that all domains are related from any endpoint.
This can also be done with just the IP:
```
openssl s_client -showc…
willk updated
3 months ago
-
In highly audited environments that are mainly managed by terraform I would like to know if it would be possible to cryptographically sign each resource provisioned, to track, for example, that the re…
-
Medium+ Vulnerabilities and their info
Description of high vulnerability:
CVSS score of 7.5
The remote host supports the use of SSL ciphers that offer medium strength encryption. Ness…
-
Here is the reference for what I am asking?
![Validity-Unknown-in-Aadhaar-Card-when-it-is-not-Verified.png](https://github.com/JakubMelka/PDF4QT/assets/77267330/2112e086-60f9-4654-aeb7-24dfb94af40f)
…
-
- [ ] Personas
- [ ] Demographic Information
- [ ] Digital Identity
- [ ] Privacy and Surveillance
- [ ] Access and Inclusion
- [ ] Trust and Misinformation
- [ ] Public Discourse
…
-
- [ ] Personas
- [ ] Demographic Information
- [ ] Digital Identity
- [ ] Privacy and Surveillance
- [ ] Access and Inclusion
- [ ] Trust and Misinformation
- [ ] Public Discourse
…
-
The SBOM is used to determine the provenance authenticity and integrity of the Temurin binaries, and as such should be able to be verified by the consumer to be authentic.
This issue is to enhance …