-
The Verifiable Credentials Working Group is requesting a TAG review of Controller Documents by the end of summer 2024 (ideally, sooner). Controller Documents are a generalization of DID Documents and …
-
Hi there,
Could you provide a bit more guidance on the required format of the symmetric key? The docs mention 32 characters long, then base64 encoded. I've tried generating it the way I'd expect vi…
-
dosent really matter how,
idea is for client to have commands:
.encryptedtell username
this only work if a passphrase is given
.setencryptedtell username (passphrase)
this sets a passphrase…
-
Currently, restic threat model assumes that host which is being backed up is fully trusted; that assumption is reasonable. For certain backends, there is a support for an _append only_ mode, which hel…
-
### Is your feature request related to a problem? Please describe.
The primary goal is to enable atProtocol access for web applications. To achieve this, we need to undertake the following steps:
…
-
### Finding Description
The application was found to operate weak cryptographic algorithms on sensitive data while exercising the app. These outdated algorithms are often in violation of common compl…
-
Hello,
I wanted to find a way to share a private key between devices safely. I thought about encrypting a 0 in device A and sending that ciphertext to device B. In this location, I wanted to add that…
-
Porting https://github.com/EnTeQuAk/m2secret (originally forked from Andy and originally written back in 2009) to https://github.com/pyca/cryptography/ kinda revealed that our currently used system fo…
-
Hi,
Is there a chance of implementing 512 or 1025 AES for browser encryption?
Thanks
Petter
-
### Finding Description
The application was found to operate weak cryptographic algorithms on sensitive data while exercising the app. These outdated algorithms are often in violation of common compl…