-
It may be an easy doubt.
Doubt is in the file of EID-computation in Eddystone-EID
1) in point "4 - Secure key exchange EID configuration", What does key pair means? Public and Private key of beaco…
ghost updated
6 years ago
-
-
Filing this in response to this Twitter thread: https://twitter.com/dvyukov/status/1354339035322449922
Today, AFAIK the main syskaller instances all run as "real root" i.e. `CAP_SYS_ADMIN` without …
-
By querying only a certain part of the database, the user leaks information to the database. Thus, the feature we provide by exposing the choice of privacy to the user, has to be used wisely. We shoul…
blipp updated
9 years ago
-
The README of the SEAL library mentions:
> Homomorphic encryption is not a generic technology: only some computations on encrypted data are possible.
Perhaps within a certain scope/context this …
-
My comment, from #298:
> I do wonder if we should make ReseedingRng combine state from both its previous output and fresh entropy (e.g. produce two seeds and XOR them). And no, DJB's attack doesn't…
-
Hey, snwagh.
I have been reading your paper Falcon. I am interested in how to use randomness functions of AESObject in Falcon.
e.g.
let partyA and partyB have r1, partyB and partyC have r2, and p…
-
/user/*/builds calls User.getBuilds which traverses all projects and looks for builds authored by that person. The search is limited to the past week or 10 builds; but 10 builds for every project is s…
timja updated
10 years ago
-
Descriptions for the web API categories that would show up on an index page like this.
![Image](https://github.com/denoland/deno-docs/assets/776987/34c7bd2c-1f89-42f7-acd1-67f37a4be0bc)
donjo updated
3 weeks ago
-
Whilst reviewing the UIA Proxy for LDAP injection, I noticed that OpenLDAP uses SSHA for password hashing with SHA1 which is non-ideal. SHA-1 is fast to compute and should not be used for storing pass…