-
It's been almost a year since the last release, and most commits since then have been limited to auto-generated dependabot PRs. The outdated version of timm required to use smp now makes it incompatib…
-
Comment below with questions or thoughts about the reading for [this week's workshop](https://github.com/uchicago-computation-workshop/Fall2019/tree/master/10-24_Turner).
Please make your comments …
-
With a small group of individuals controlling the majority of the wealth in our solar systems, the Wealth stat becomes a heavy tool wielded without consideration for harm by individuals and organizati…
-
This technology is only going to be used for evil purposes. To deceive people, steal their money, possessions, undercover operations. Nothing good. It is already being used for scams like the pig-butc…
-
Tracking item for Azure Identity Threat Model Update and Review
- [x] Update Threat Model for WAM
- [ ] Review Threat Model Checklist, linting tools, update diagrams (see `Threat Models` tab in On…
-
After taking a look at this, it seems it's overly-complex and not clear, for something that should only serve a simple purpose: "proving the user requests are coming from his browser where he initiall…
el1s7 updated
6 months ago
-
We found the articles each of us will read and write a lit review for before next class. Me and Arya have two articles and Logan has one, he won the rock-paper-scissors.
-
Hi,
I mentioned it in Discord. It would be handy if you could annotate enumvalues with a description so you could tell the AI when to use it.
What currently work is this:
` @Description("…
-
When loading a model, it downloads from Google Drive, it downloads a .pt file but just contains html content of download verification page like the following screenshot. And then, it leads to some err…
-
Threats involving exploitation of software vulnerabilities in Host or Process assets are modelled as threat paths composed of simpler steps:
1. Discovery of the vulnerability by a potential attacke…