-
Comments. Two major, a few smaller issues.
# Privacy leakage.
This design leaks privacy to the PoS proxy, the auth sample, and the wallet proxy. To quote from https://www.graft.network/2018/11…
-
I was thinking about it recently and came to realize that if the domain is replaced with an IP address, did:web can be made fairly decentralized while still maintaining all the main benefits around ea…
-
### Steps To Reproduce
1. Have iPhone + MacBook copy & paste function setup
2. Go to Bitwarden mobile app
3. Click Login button
4. Click 3 dots for one of the logins
5. Click on Copy password b…
-
## About TXOne Networks
TXOne Networks provides cybersecurity solutions for ICS and OT environments using the OT zero trust methodology. We collaborate with top manufacturers and infrastructure ope…
-
If I use the "change trust" operation to try and delete a trustline that isn't there, I get `CHANGE_TRUST_INVALID_LIMIT`. According to [the documentation](https://www.stellar.org/developers/guides/con…
-
/kind feature
**Describe the solution you'd like**
I'm attempting to spin up a cluster that is entirely on a private network that has already been created. Unfortunately, I'm met with a uniqueness…
-
Currently if I'm looking at a project on PyPI, it can be difficult to determine if it's "real" or not. I can look and see the user names that are publishing the project as well as certain key pieces o…
-
In general, I think this proposal seems reasonable but I would like to see some more background information for https://github.com/mozilla/standards-positions/issues/1062
1. What are the shortcomin…
-
It's the first time I've seen this app as a trojan. Any thoughts?
https://www.virustotal.com/gui/file/1c4e1847c722db18d58216c43aa40ad87c8a38aa6196e69d55c0687b8506bf94/details
-
In light of the recent Floodfill router DDoS. Denial-of-service is an effective means of censorship and I can see attacks like this becoming a bigger concern on the network. Seeing as the basis of th…