-
I wanted to use [`pass`](https://git.zx2c4.com/password-store/about/) to store credentials, API keys etc to use on Terminal instead of keeping them in plaintext.
`pass` is a Linux (*Unix) tool but …
-
### Current Behavior
Getting the signature failed while validating VP
`{
"valid": false,
"validateJWTExpiryDate": true,
"validateAudience": true,
"vp": "eyJraWQiO.."
}
`
below error …
-
At IIW last week, our team from BC Gov proposed a new web-based DID method (with a spec and two implementations!) that provides a verifiable history of authorized DIDDoc updates, portability, and (opt…
-
I can see in source code https://github.com/ArweaveTeam/arweave/blob/3a894037fa461a8688d13666e43646170e8e821f/apps/arweave/src/ar_wallet.erl#L49
that it's allowed to create ECDSA and EDDSA wallets.…
-
Originally brought up here https://github.com/TBD54566975/web5-rs/pull/97#discussion_r1576858213
We need to fully-specifcy Ed25519 rather than EdDSA in our algorithm values
I actually did went a…
-
Enable in the FIPS provider.
Verify that we're conformant (most likely are)
We could not include this one but that's short sighted.
We have no test case for `Ed448ph` :disappointed:
Page 1 a…
-
In https://researchkudelskisecurity.blog/2017/10/04/defeating-eddsa-with-faults/ and the linked paper, a fault injection attack against EdDSA is described. The paper also proposes several possible cou…
daira updated
5 years ago
-
The example tokens in this library use `"alg": "ED25519"`, but the related spec seems to suggest that it be `"EdDSA"` instead.
https://tools.ietf.org/html/rfc8037#appendix-A.4
-
I'm working on adding logic to MimeKit to automatically fetch keys from a keyserver and import them when verifying signatures if an unknown key id is encountered (assuming MimeKit is configured to aut…
-
### What is the issue?
>[Sparkle] Error: Serving updates without an EdDSA key is insecure and deprecated. DSA support may be removed in a future Sparkle release. Please migrate to using EdDSA (ed2551…