-
**Describe the problem/challenge you have**
As a user I want to know the contents of a bundle before pulling it completely down. Specifically what's really important is to know the images in the bund…
-
I see. You are interested in the goddess of history, Mnemosyne, who is also the mother of the nine Muses. She is a very important figure in Greek mythology, as she represents the power of memory and r…
-
Is `file:` protocol considered a secure context? Is reading and writing to the user filesystem at `file:` protocol considered to be any less "secure" than JavaScript code a web site reading and writin…
-
Benichou L, Buschbom J, Campbell M, Hermann E, Kvacek J, Mergen P, Mitchell L, Rinaldo C, Agosti
D (2022) Joint statement on best practices for the citation of authorities of scientific names in taxo…
-
Signing the DID Document itself (adding an OPTIONAL/recommended `proof` section, for example) would offer integrity protection / move towards the did docs being self-certifying.
Since the `proof` p…
-
When these mods are all installed the game doesn't prompt the selection of origin when entering a survival singleplayer world. Opening the origin menu with 'O' yields the message "You can not have any…
-
### Related issues
### [REQUIRED] Version info
**node:** v18.19.1
**firebase-functions:** ^4.3.1
**firebase-tools:** 13.3.1
**firebase-admin:** ^11.8.0
### [RE…
-
It seems like IPNS could, in theory, provide a rudimentary alternative for the DNS and CA infrastructure, and act as a complement to the plain TLS handshake and HTTP protocol stack (though with some m…
-
The following issue outlines two significant security vulnerabilities in data integrity.
For convenience in reviewing the below content [here](https://docs.google.com/presentation/d/1MxLMIjubCVykDu…
-
At the moment, anyone with the webhook URL can use it to to post messages as an incoming webhook. While this is by design, some customers have desired to constrain who can use this URL, even if they h…