-
During 2.0 development there was a view that we should just use labels to track the object classification data, like indicator type, report type, malware type, etc.. On the surface and at the time, t…
-
**Synopsis**
Some people want _package signature verification_ during their pip installs. Other people think relying on _authenticated package repository connections_ (such as over TLS) is sufficien…
-
Hello all
After 2 mounth whithout RawtherapeeI, I updated "[locallab](https://github.com/Beep6581/RawTherapee/tree/locallab)" branch with a modification allowing several "Control points".
I put 5 cont…
-
Memory mapped IO is a completely different animal than the normal memory. It may mask bits when reading/writing, it oftens changes values of registers "asynchronously", may be inherently stateful and …
-
The biggest threat to password security right now is passwords that have already been stolen from systems that aren't secure.
The runner up is brute force, and brute force can be distributed and opti…
-
I think that VCDB needs a single JSON database consisting of an array of all json incidents. Quite a few graphical data analysis tools need this (surprisingly).
I have created a project here in the…
-
Produce the threat model (Microsoft Threat Modelling Tool) for the system - this will draw heavily from the component architecture diagram.
-
This one's a bit difficult as i dont know where you could actually find this.
But we store all our previous years calendars, since 2015 for historic reasons as well as the ability to refer back to th…
-
CoyIM is a new chat client for the Jabber/XMPP protocol. On the surface, CoyIM looks a lot like other chat clients such as Pidgin, Adium and Gajim. However, under the hood, things are a bit different.…
ghost updated
7 years ago
-
How do you use the 64 byte array retrieved via kp.rawSecreteKey() to populate a new Keypair?
Thanks,
Mike