-
Rights on hosts are represented via Control and UserTW attributes, where UserTW can represent anonymous access or, if associated with a Process, access with the rights of that process. These rights ar…
-
The mechanism for 'surfacing' threat consequences at IoT devices is not working as it should.
The basic idea is that a Sensor is a device that acts like a source of Data, while a Controller is a de…
-
Currently, depending on if a series has been matched in standard mode or multi-episode mode (i.e. tvdb2/3/4 mode), different sources of metadata will be used for each episode's Director and Writer. In…
KingJ updated
1 month ago
-
I'm splitting this out from the discussion that starts on this comment https://github.com/whatwg/html/pull/5465#discussion_r1042020381 and then jumps to overall issue comments starting here https://gi…
-
-
As I understand it, the TOC is starting to review projects with a consideration to reassess their level in the CNCF or even to remove them altogether. I wanted to bring the Notary V2 project to the T…
-
**CII Badge - Requirement:**
The software produced by the project causes the storing of passwords for authentication of external users, the passwords MUST be stored as iterated hashes with a per-user…
-
The following issue outlines two significant security vulnerabilities in data integrity.
For convenience in reviewing the below content [here](https://docs.google.com/presentation/d/1MxLMIjubCVykDu…
-
This issue was created from results of the Security Assessment Improvement Working Group (https://github.com/cncf/sig-security/issues/167#issuecomment-714514142).
# Getting more reviewers for Se…
-
I have been working through the hyper_pca.Rmd file as I would like to do a similar analysis on different species for my masters dissertation. However when it comes to performing the probabilistic exti…