-
```
What happens if A opens a TorChat session with B, but C (on another computer)
also tries to open a session with B using stolen credentials of the A?
Similarly, if A and C (using the same credent…
-
We are going to implement a general abstract layer for MAM. This abstract layer includes a secure procedure to communicate between `tangle-accelerator` and `TA-endpoint`.
The request/response forma…
-
I have a docker image that uses a self-signed certificate (https). mycert certificates bellow are real and not self-signed. Only the certificate inside the docker image is self-signed.
```
var pro…
-
The domain do not support secure connections. So... It is not sure/secure, that we go out together 😐
Please support secure connections
plehr updated
9 months ago
-
When running odd in a cloud environment (as it is supposed to), you will regularly have new instances (e.g. after a version upgrade or just because AWS feels it needs to replace the hardware), still b…
ePaul updated
8 years ago
-
I know that the request payment API requires a secure context. Running it on live, I can see at least 3 different users having the problem with `Failed to construct 'PaymentRequest': Must be in a secu…
-
@DESKTOP-E292LO1:/mnt/c/Users/qingguoguo$ ssh localhost -p 23
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@…
-
Hey,
I imagine public mesh network created from servers and desktops running weave, but I see one issue: encryption and man-in-the-middle attacks.
Currently weave only allows network-level encryptio…
-
I have multiple Raspberry Pis in a potentially hostile network. I'd like to use cote for discovery and communication, replicating data across all nodes. I've produced a similar library to cote — [odo-…
-
**Affected files**:
request/request.js
`255: self.rejectUnauthorized = false`
**Risks**:
The application explicitly sets the parameter for the HTTPS request to disable verification of the certif…