-
as dad
-
asdasd
-
adds
-
For a curve like secp256k1, which has 32-byte (256-bit) $G$, we take 32+8 bytes (256+64 bits) from CSPRNG and mod-divide it by curve order $n$. This follows FIPS guidelines and has $2^{-64}$ bias:
…
-
We need to change this error message - it tells hackers to move on to a different e-mail:
![image](https://cloud.githubusercontent.com/assets/8770069/9041342/a78f0082-39d5-11e5-8ade-d1cd6d5a01b4.png)…
-
In many places in ROBERT whitepaper, a comparison is made with an analysis of DP-3T:
> Although it might seem attractive in term of privacy to adopt a fully decentralized solution, such
approaches…
-
Some events currently being logged should trigger a response, for instance:
- failed authentications should be counted,
- automatic lockout or IP ban should be set for bruteforce attacks,
- failed del…
-
I'm fascinated by your claim that this is a simple, decentralized, software-only solution to the Authentication Problem that somehow you have solved where lots of other smart and highly-trained people…
-
### What happened?
Docker crowdsec container is using high CPU usage (50-100%)
### What did you expect to happen?
Not have high CPU usage
### How can we reproduce it (as minimally and prec…
-
### What happened?
I started to use AppSec component 1 month ago and everything went well.
However, I found After starting AppSec, the /tmp folder will quickly increase with a large number of files,…