-
Actual behaviour: After tampering with the data file that stores the bouquet names, the new data that I've added reflects fully in the program
Expected behavior: Any error handling of choice should be…
-
**Describe the bug**
Failure to decrypt file for playback. No audio.
**To reproduce**
Steps to reproduce the behavior:
1. Launch `librespot`
2. Connect with mobile phone to librespot
3. Attem…
-
Thank you so much for your work on this project!
I was wondering if [Shamir Secret Sharing](https://en.wikipedia.org/wiki/Shamir%27s_secret_sharing) (SSS) could be added. SSS splits a key file int…
-
### Problem Statement
In the current implementation, trace exporting is enabled by default (`OTLP`). This can cause issues because it repeatedly tries to connect to a tracing service that hasn't be…
-
When the app uses the JSON file to load data, and a certain patient's contact is updated to a non-personal contact number (i.e. 999), the app allows it and does not validate the number that it is a pe…
-
Description: Implement a blockchain-based system for secure and transparent property transactions.
Tasks to Accomplish:
Research and select a blockchain platform.
Design the transaction system …
-
@mattsaxon wrote: "How do we ensure that fields are not tampered with (e.g., malicious changes to the beneficiary)?. Similarly, it is important that the payeeName not be changed by the payer or the pa…
-
**What**
Let's have a code quality inspection that locates instances of a `For` loop variable being explicitly tampered with inside the loop body.
**Why**
A `For` loop that modifies its counter v…
-
First off, thank you for all the hard work on the Riptide. It’s a great tool for low-latency, reliable networking.
I recently found Riptide and I'm amazed how robust it is and the features it has.
…
-
List of references to external tools on update site are neither signed or hashed. This makes tools installer vulnerable to tampering. First content should be signed to prevent malicious third parties …
timja updated
5 years ago