-
# DevEx/OpEx
Who is Ott's back-up, we need to find this out and document it.
## Tasks
- [ ] Something.
## Additional Context
Add any other context or screenshots about the work here.
-
```boogie
procedure unsound() {
var x: int;
assume(x == 0);
if (true) {
goto Inside;
}
while (x < 10000) {
Inside: x := x + 1;
}
assert(x == -1);
…
-
I'm looking at doing a third implementation of sha256 for x86 targeting the x86-64-v3 ISA level (AVX, AVX2, but no AVX512 and no SHA-NI, i.e. Haswell), because the pure-rust soft implementation isn't …
-
Hey,
first of all thanks for your great project. I use the generated P256r1, P224r1, P384r1 and P521r1 with additional C code (point_double and point_add from BoringSSL, plus the inversion template…
-
Since FireWire, Thunderbolt, PC Card, ExpressCard, PCI, PCI-X, etc. are all potentially vulnerable to DMA attacks, we should consider isolating those controllers in the default sys-usb, or a separate …
-
**What happened**:
![image](https://user-images.githubusercontent.com/9914262/218372391-e5e8f2e6-1f03-4405-a80b-bfdba4dd32f0.png)
```
test1
| where time >= datetime(2000-01-01T00:00:00Z) a…
-
Checklist
---------
- [x] I have been made aware that if my problem can be summarized as _"I've created or tried to create a media using Rufus, and ..."_, and I am not including a log, **this i…
-
Re [HD keys - BIP 32 and beyond](https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/topics-and-advance-readings/hierarchical-deterministic-keys--bip32-and-beyond.md)
CC @Christop…
-
For each computed chunk, an Execution Node includes a [hash of all events](https://github.com/onflow/flow-go/blob/d69930a2472c99c7e51e58155a0de46022b267e7/model/flow/chunk.go#L8) in its [Execution Res…
-
The axiom "regions-precede-if-they-meet", [suk-1], says, in prover9 syntax:
> all i1 all i2 all l1 all f2 ((((-(bfoiof(i1,tinstbcat,i1))) & (-(bfoiof(i2,tinstbcat,i2))) & (lastInstantOf(l1,i1)) &…