-
## Summary
KeePassXC currently uses [AES or Twofish](https://keepassxc.org/docs/#faq-security-why-pm) block cipher to encrypt a database. This issue is a feature request to add support for an estab…
-
Can't we have a system like this:
> it uses money as a tool when it is appropriate (like when I want ice cream but my freezer is broken, and i have no milk and none of my friends make ice cream) and …
-
For security reason in banking application and this is actually a bigger topic as how to control Kafka access from all the services.
-
1. Why do you need DID and why public key cryptography is not enough?
2. How does the normies (individual with usually just a smartphone) can become liquidity providers (PFIs)?
3. How does P2P Fia…
-
[Bounty](https://github.com/bitcoin-dot-org/bitcoin.org#earn-bitcoin-for-contributing): **25,000 bits / ~$250 USD**
**Introduction**: Not everyone who's interested in Bitcoin, is able to buy Bitcoi…
-
This proposal achieves privacy-friendly web hardware revocation (i.e., hardware ban). In particular, it makes a web servicer(i.e., web server) capable of blocking users who have previously abused them…
-
**Title of the talk/workshop**
Azure data engineering Using Synapse
**Abstract of the talk/workshop**
This workshop is designed to empower students with the skills to harness the power of Azu…
-
As proposed [here](https://github.com/w3ctag/design-principles/pull/89#issuecomment-379133414) which is continuing on from https://github.com/w3ctag/design-principles/pull/75:
It should be possible…
-
- [ ] Proposal added
- [ ] Discussed in LDM
- [ ] Decision in LDM
- [ ] Finalized (done, rejected, inactive)
- [ ] Spec'ed
See
- https://github.com/MattWindsor91/roslyn/blob/master/concepts/do…
-
Questions for Herb Lin, inspired by the week's readings:
1. Herbert Lin & Amy Zegart, Chapter 1 (Introduction) from Bytes, Bombs, and Spies
2. National Research Council, Summary section from At th…