-
Questions for Governor Jerry Brown.
-
User could grant authorization (assuming client has `redirect_url`)
* For this specific client instance running on this specific device
* For any instance of client with this `redirect_url` no mat…
-
## Required Information
#### Description
New information came in from The Rise Power General Assembly #122 Consented on March 24, 2017.
First, here's the new website: http://www.newfound…
-
I don't immediately follow how analytics attackers are measuring time to link IP address to first hop, but @TheBlueMatt suggested that they are using this currently, and that a valid countermeasure is…
-
Apologies for reporting this in public. The [button to do so privately](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vu…
-
this thread is to draft:
* donation campaign page / blogpost
* social media tweets / shareable images / hashtags / designs
around a potential crowdfunding campaign.
-------
threads potenti…
-
Distributed hash tables are powerful protocols that enable content discovering and routing in P2P networks. In "vanilla" DHT implementations (e.g. Kademlia), peer interactions leak a lot of informatio…
-
I'm reading through **A Formal Security Analysis of the Signal Messaging Protocol** https://eprint.iacr.org/2016/1013.pdf. I'll be taking some notes here relating to:
- security considerations in a…
-
Websites and embedded content can use cohorts to:
- Set prices dynamically based on if the user is price insensitive or likely to compare.
- Alter headlines to target specific demographics.
- Targe…
-
**Reported by Oleg Artemiev grey olli on 12 Sep 2014 08:14 UTC**
It could be usefull to have a text description for a VM in its
properties to document changes/difference.
https://groups.google.com/d/…