-
I have been contacted by several people on Discord and Matrix who told me that they were sent creepy messages by the anti-Stallman crowd, calling them to remove their signatures and threatening to sta…
-
\[**The text of this proposal is outdated.** Find the whole proposal [here](https://golang.org/design/25530-sumdb).\]
This is a proposal for a long-term plan to provide transparency logs to verify …
-
The Pwned Passwords (https://haveibeenpwned.com/Passwords) website recently upgraded to version 2 (https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/) and 1Password provided integra…
-
Apologies for spamming the issue tracker, this is an additional concept that I thought about and which I haven't seen discussed here yet (though maybe you discussed this internally already). I think i…
-
Using sdcMicro. Ran a k-anonymity but infos 2/3 -anonymity component of report fails to sink to a file. It is showing in red but throws no error or warning.
![report_with_error](https://user-images…
-
It would be nice if there was a first-class way to check a password that is already SHA-1 hashed. If that's all I have, I obviously can't simply unhash it. Since this is what https://api.pwnedpassword…
-
## Preface
The base CASTLE algorithm satisfies k-anonymity in the context of data streams, but (provably) does not satisfy differential privacy. Three additional constraints must be satisfied by a…
-
as requested by Keith, the Security Considerations should include a description of some of the threats to a business with respect to public release of the data in the IG. How is the information Busine…
-
## Preface
L-diversity is a strengthened variation of the k-anonymity constraint which enforces that, in addition to a generalisation consisting of at least k different tuples, it must also contain…
-
## Prework
---
By filing an issue to this repo, I promise that
- [x] I have fully read the issue guide at https://yihui.org/issue/.
- [x] I have provided the necessary information about …