-
It should be _pretty easy_ to have a basic flow so CI created images can be signed, and verified on pull. Not sure what algorithm(s) / tools we should use? Accessibility is key, both IRL and in CI, an…
-
While testing my RFC 8449 patch #18248 with KTLS enabled system
I became aware of a sporadic test failure, that turns out to be also there
without my patch. I've been able to reproduce with master …
-
Some shows have encoded subtitles, which is similar to - I think - HiTv encoding [https://sepr0.com/posts/encrypted-subtitles-gohitv/](url)
Sample URL of encoded subtitles:
[https://kisskh.co/Drama/…
-
The FIPS mode has restrictive security configurations, so update the OpenJDK exclude tests list “ProblemList-fips.txt” for the FIPS testing.
-
Requested by niols from IRC.
Make files expire after a user-selectable (maybe with a low default to save on server space) period of time.
We could do this by just deleting expired files on access a…
-
I have been trying out your program but I can't get a result. Maybe I am doing something wrong? I use Cryptool to encode:
VONGE NERAL JBUSH ENHAG ENJFU RGENE RALOB ERSTJ DIETL JOPER ATION
using sett…
ghost updated
3 years ago
-
https://en.wikipedia.org/wiki/Replay_attack
> A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated …
-
Generally speaking, I think the simplicity is in the separation of concerns.
Some random though
1. One of the weakness of SSB today is the fact of relying on long term key pairs. In a few year…
-
Per contribution guidelines, submitting reference data files for Symwave-based drives. These are binary images of the key sector from my personal drive, along with the first two leading sectors. Two v…
-
**Describe the bug**
Hello guys, if u could check and shed light on strange behaviour with decryption
We upgraded to bouncycastle 1.75 to fix packet 20 error for decryption, and now for newly genera…