-
Looking at ACA-Py they do quite some manual checks on the values of a proof and matches it to encoded values to make sure the proof hasn't been tampered with. We need to make sure to add these checks…
-
```
What is the expected output? What do you see instead?
It would be nice to dump return values instead of just tampering them.
Parameters can be dumped. Whatcha got against return values? :-)
What…
-
> MAC-then-Encrypt has resulted in serious problems in other tools and protocols. It intuitively makes sense why that would be. You're willingly allowing data to be tampered with and for that tamperin…
-
The vulnerable get_load_jpeg_buffer function in file jpeg_buffer.h (https://github.com/GreycLab/CImg/blob/master/plugins/jpeg_buffer.h#L227) is used to decompress jpegs and create a raw bitmap version…
-
**Is your feature request related to a problem? Please describe.**
If the the test result output files from e.g. Robot Framework contains items that are missing the timestamps (e.g. starttime='N/A') …
-
For copy/paste to work on Google Docs using the keyboard (Ctrl+C, Ctrl+X, Ctrl+V), it needs `dom.event.clipboardevents.enabled` to be enabled.
We could however disable `dom.allow_cut_copy` (introdu…
-
A common paint point in Heads is that when any changes are made, it is difficult to tell if the changes are intentional or due to tampering.
In my opinion, the best solution to this is to eliminate…
-
When I deleted the `dish.dat` data file and started the app, the list of dishes reset and I am able to enter dishes with the same name as before but with a different price.
However, the order list th…
-
There is a prototype network called Riffle which has a method to force exit nodes to send traffic as intended. They call it the hybrid verifiable shuffle. The best property of the hybrid verifiable sh…
-
Hi - I have a question about [heading 4.1.2 of the C2PA v1.3 specification](https://github.com/c2pa-org/specifications/blob/39162d6df8c05849a10411b6770e93cbf7bbd921/build/site/specifications/1.3/guida…