-
As others have already pointed out in issues in this repo, both ISO mDL and the SD-JWT (VC) family of specifications define credential formats that are "locked in" to certain securing and selective di…
-
Hey , since your project is about containers and it provides more security , I want to know if it does not allow a user to access root login even though if they knew the password for the root ?
-
It would be good if aptly could mirror a remote apt repository that was secured via
https client certificates (see e.g. http://nategood.com/client-side-certificate-authentication-in-ngi
http://server…
-
### Is your feature request related to a problem? Please describe
Identify breaking changes w.r.t. developer or user experience and finalize the release process for the new setup changes to secure …
-
### Discussed in https://github.com/sle118/squeezelite-esp32/discussions/217
Originally posted by **DariBer** January 14, 2023
I have a question regarding securing Bluetooth pairing a device l…
-
**Describe the change you'd like to see**
We should document in the admin guide how to set up Knative and Kubernetes securely (referencing up-stream guides as appropriate).
Topics might in…
-
Local cluster login files include the cluster definition but we've been scrubbing hosting manager related secrets here after cluster setup completes as a security measure.
Unfortunately, now neon-des…
-
**Original report ([archived issue](https://osrf-migration.github.io/gazebo-gh-pages/#!/osrf/gazebo/issues/1616)) by ruffsl (Bitbucket: [Ruffin White](https://bitbucket.org/%7B6a46a82e-2fa2-4c3e-8eda-…
-
Hi,
Can docker auth mange access control to resources hosted by any service and not necessarily docker?
Say I have a web service that returns hello when called on **localhost/5002/api/v1/hello…
-
- Content is:
[ ] Coding tutorial
[ ✓] Informational content
[ ] Other (describe)
- Which blockchain protocol is this about?:
The article outlines best practices for securing blockchain a…