-
I created a new cert today, with a CA I haven't used in a while.
I used option `4) Perform a one-step request/sign`
Bacula complains about this cert: `ERR=26:unsupported certificate purpose`
…
-
[ProcessDetachedSig.groovy](https://github.com/SecureBankingAccessToolkit/securebanking-openbanking-uk-gateway/blob/master/config/7.1.0/securebanking/ig/scripts/groovy/ProcessDetachedSig.groovy)
Th…
-
## Feature: Non-repudiation for queue-worker callbacks
Suggested by: Ed Wilde @ewilde
We can use HMAC or RSA and HMAC together to sign messages when we use the X-Callback-Url. This means that r…
-
just had a small question:
How can we attack a system which follows fiat-schamir heuristic given that the hash computed in by the prover in the second step only includes the provers public key and…
-
### error summary
Error validating JWS error at receiver side when receiving post /quotes request call.
### Sam's input
On an initial review: there seems to be quite a few discrepancies between the …
-
- [ ] In detail with sport planning (bring ball, organize teams)
- [ ] filtering
- [ ] esn card ?
- [ ] Aidan vs Stripe
- [ ] Conn every memeber to this account,
- [ ] Non-repudiation for the…
-
Навести приклади класифікацій атак, чи моделей загроз, чи методологій аналізу безпеки застосувань, чи інших подібних більш-менш формальних підходів до безпеки.
Такі підходи дозволяють впорядкувати …
-
As a security engineer, I need to have the ability to audit any and all queries performed against any database by a principal that's been granted temporary read-access.
# Scenario
Developer DEV does n…
-
For some companies, OSS contributions that can be linked to the company raise a risk of reputational damage. For example, a wealth manager may be unwilling to allow contributions in case they suffer a…
-
Don't know what this means or what constitutes sensitive
`Alter sensitive tables to utilize system versioning.`
```
-- suggested fix
ALTER TABLE InsurancePolicy
ADD PERIOD FOR SYSTEM_TIME (S…