-
Coreboot configuration should provide a build-time toggle to disable the plundervolt mitigations so the user can easily undervolt their CPU.
I guess as a start for those affected: what microcode revi…
-
I don't actually know what to do about this:
> The mitigations to the content exfiltration case regard participants
> in the protocol as potential passive attackers themselves, and apply
> the …
-
**Describe the bug**
Whenever this tool is started (the first time it asked for my Steam login credentials and i've provided them - logged in), it displays the following error message and upon clicki…
-
- drain/undrain entire cluster
- drain one service in one cluster
- method for setting qps per cluster, spilling?
- fast-rollback
- add capacity to service in cluster (set limits?)
some in…
-
Have available on Internet is okay, but mitigations would be appropriate:
https://security.stackexchange.com/questions/211638/swagger-on-production-apis
-
Section 4 claims to make one statement, then fails to properly support that statement with its example.
The point that changes in one part of the stack can eliminate security or privacy advances in o…
-
The butterfly firmware locks up and the device resets when attempting to talk to it with whad-client. The device shows up fine in the kernel log.
@jslawek threw out some ideas about disabling vario…
jduck updated
7 months ago
-
It would be nice to have a more readable output for scanning directories/multiple binaries.
Some ideas:
- If a given mitigation is not enabled in all binaries, list it only in a summary that all b…
-
**Is your feature request related to a problem? Please describe.**
It's frustrating that you have to choose each element and generate threats for each and everyone of them.
**Describe the solution…
-
### User Story
As a Smithy-Dafny customer I want
Smithy-Dafny to model access denied errors from AWS Services
so I can implement Dafny logic to handle
such access denied errors.
### Curren…