-
**Tldr;** The trigger for this bug is the nmap udp scan. If nmap scans already exists and the udp scans complete, the first data is discarded. During the standup it was mentioned that this was due to …
-
Is there any documentation about deploying Tegola?
If approaching it myself I'd probably do, with some notes
* Daemonize the process and handle it with init.d/upstart/etc
Some way to run the …
-
-
### Proposal
This ticket is about tracking research and development to add support for OAUTH2/OpenID Connect providers.
### Motivation and context
Basic idea is to use the functionality to en…
-
Distributed hash tables are powerful protocols that enable content discovering and routing in P2P networks. In "vanilla" DHT implementations (e.g. Kademlia), peer interactions leak a lot of informatio…
-
Comments from BlackRidge Technology on the draft Report to the President On Federal IT Modernization are attached. If you have any questions or comments, please reach out to me at the contact informa…
-
-
-
-
This working group has produced a ton of useful information about how best to build a secure package repository, along with data on what repositories are currently doing. Can we crystallize this into …