-
The general idea would be to use ECDH with a secret key backend on a hardware security token/HSM/TPM to generate a PSK which we either use directly or as an input to Rosenpass (see #53).
This PSK w…
-
We should add an FAQ section to the repo and ideally, the CSC website as well.
I think this should include questions related to gaining access to XNAT and the Secure Enclave, setup, XNAT-related go…
-
I'm a little bit confused by subsections **Secure Deep Learning** and **General Research** - I think it would make sense to split the awesome-list subsections into current research directions. I propo…
-
Right now, we use pkcs12 with a hardcoded password of 'changeit'. On Android and iOS, we use Secure Enclaves, leaving a large security gap between mobile and desktop.
-
We don't want node providers to be able to read the state data of canisters they host. This might be accomplished through:
* Multi party computation
* Secure enclaves
* Homomorphic encryption
-
Thank you so much for this project! I truly appreciate it.
First, I would like to contribute to your readme as I just got a brand new mbp from work and this is literaly the first thing I am buildi…
-
It is important to check the support of reported cryptographic algorithms in [Cryptograhic Algorithms](https://italia.github.io/eudi-wallet-it-docs/versione-corrente/en/algorithms.html) Section by the…
-
can add possibility to:
- allow some process to interact with a specified prtected process?
- protect together some proces to allow them to enteract with whem freely?
thank
-
Hello,
the SMPC [demo](https://secure-xgboost.readthedocs.io/en/latest/tutorials/multiclient-distributed.html) shows two clients joining to train a model, where both clients have identical train se…
-
We provide interoperability with the [IdentityAgent](https://docs.cyberduck.io/protocols/sftp/#configuration-file) configuration directive from OpenSSH with iterate-ch/cyberduck#12710. Use cases shoul…