-
Hello,
it's more a question than an issue. How the system should handle the fact that we use twice a token? (To avoid Man In the Middle attack). Should the library handle it or our implementation?
…
-
This flow could be prone to 'man-in-the-middle' attacks at 'Message 2' [Link ](https://github.com/italia/eudi-wallet-it-docs/blob/df948503e22cbf949530a07b6cee0e83e6901613/docs/en/wallet-attestation.rs…
-
If MANPATH environment is set, only man pages located under directories specified by MANPATH are shown.
e.g.,
```
$ echo $MANPATH
/usr/share/man/openmpi-x86_64:/usr/share/lmod/lmod/share/man::
$ ma…
-
This code uses insecure `http://` and `git://` URLs for installation of programs. This is a bad idea, as a man-in-the-middle attack would allow arbitrary code execution. `https://` URLs should be use…
-
Background:
Lately I was trying to find a solution to synchronize calendars between Android and Linux with no 3rd party servers in the middle, and didn't find any reliable ready to use tools. Though …
-
The package contains examples of creating ArrayStream objects given a schema and a vector or list of arrays. That helps for chunks returned via, say, RecordBatchReader as this may not require the con…
-
To get stuff working, I used `AutoAddPolicy`, but there is some man-in-the-middle security risk related to that.
Check if we can do that more securely.
-
*Title:* Finding 11
*Line:* 0
https://preprod.armorcode.ai/#/findings/3077446
*Title:* Finding 10
*Line:* 0
https://preprod.armorcode.ai/#/findings/3077445
Knowledge Base:
Man in the Middle (MITM…
-
Hey guys,
I have a few questions, what Pi will be best used for your project?
For now, I'm using Pi zero w2 and it seems to be extremely slow compared to the AAWireless dongle,
also it seems like t…
-
A "proof" section, like in DIDs, should be added to TDs to protect their integrity. This is important if we want to do things like refer to public keys, etc. from inside TDs; we don't want a man-in-…