-
Take the three predators and two escapers in simple_tag as an example. I tried to print the status information of these five agents and got an array. The status information of good_agents is 18 and th…
-
Hello,
I'm a security research. I perform a security testing on open-source projects for free.
**Bug**
1. Users can create a username with a space in it. For example "tester" and " tester". How…
-
When rendering something like the image caption "Feature visualisation [...]" in [this doc](https://docs.google.com/document/d/1hHAx92e89YQfBXT96C7BLiuMipcl6LOszGlG2L7rrZo/edit) the text is broken int…
-
Full stacktrace:
```
/pytorch/aten/src/THC/THCTensorScatterGather.cu:188: void THCudaTensor_scatterFillKernel(TensorInfo, TensorInfo, Real, int, IndexType) [with IndexType = unsigned int, Real = lo…
-
> Mailgun is depended upon for email (and therefore authkey) delivery.
>
> They could change the authkey to an arbitrary value, deny access to the email, and/or vote using the authkey link themselv…
-
> SIV needs a more formal threat model.
>
> Formally stating what adversaries you expect to prevent what sorts of attacks is a really important part of designing any cryptographic system. When exam…
-
The wiki states the following in the Shards section:
'These properties help RenVM to resist attacks made by irrational adversaries (adversaries that do not care about profiting from an attack). **B…
-
> Google’s Firebase is depended upon for data storage and transmission
>
> One could imagine such data being deleted, modified, or lost. Though this might be recoverable (is it?) it’s still not som…
-
### The problem you're addressing (if any)
QubesOS 4.1 seems to use argon2i (**not** argon2id) by default for the LUKS KDF.
It would appear as though argon2i is less resistant to attack by sophi…
-
I propose we document the [Threat Model](https://en.wikipedia.org/wiki/Threat_model) of the Shadowsocks project. The Threat Model should explain the scenarios to design for, and the assumptions about …