-
Two things
1.
Currently we use Noise XX with Kyber in a hybrid forward secret construction. If I recall correctly we are using Kyber NIST round 3 variant. We should learn the new Kyber parameters …
-
Original release date: February 9, 2023
### Summary
Note: This Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail var…
-
### Describe the Issue
- **Current status:**
The [Github Actions tab](https://github.com/magma/magma/actions) is untidy and cluttered by a lot of workflows, which are outdated, abandoned, only use…
-
Some stations need edits, for example, the icons and title of "Kulturradio". How can I update that?
http://www.radio-browser.info/gui/#!/history/960c1c0e-0601-11e8-ae97-52543be04c81
* Should bec…
-
Florence D asked:
There are several points in the draft where properties of, or restrictions on KEMs, are mentioned but it's not clear whether this applies to all KEMs, just to the next-generation KE…
-
wer den weltuntergang NICHT sieht, der liest die falschen nachrichten (blaue pillen)
welche news lese ich? also, wem glaube ich?
**iceagefarmer**
iceagefarmer @ telegram
archiv: https://mi…
-
Group ids are signed to bind certain information to specific groups. But I can imagine a case where a user mis-uses the group id to be something like a "room title" which lets an adversary control the…
-
## TL;DR
Jamtis addresses as now designed double the length of current Monero addresses and approach 200 characters. Much thought and much discussion among Monero Research Lab members went into thi…
-
## Link to rule
[Azure Integration Rules](https://github.com/elastic/detection-rules/tree/main/rules/integrations/azure)
## Rule Review/Tuning
The following rules are older than 90 days and could…
-
**Problem:**
The current Attack object describes the involved technique (uid [string], name [string]) related to the attack and its associated tactics. As one technique may be associated with multip…