-
### Introduction
This introduces a masking of all personal identifiers used in the end user models as well as supporting masked versions as input parameters already supporting personal identifiers tod…
-
As previously discussed in issue #40, it is not always possible to unambiguously determine data flows, given a set of 'Process-uses-Process' and 'Process-handles-Data' relationships. Users can assist …
-
Swiss government and military was hacked in 2014. They were very public about it, so there is a [report](https://www.melani.admin.ch/dam/melani/en/dokumente/2016/technical%20report%20ruag.pdf.download…
dbosk updated
5 years ago
-
The security document provides some nitty gritty, but it would be nice to have both a more approachable, user-friendly explanation and also a hard-core tech explanation. Both have merit.
-
A suggested improvement to the wiki: detailing the methods to use a virgin (or freshly factory reset) and wireless hardware removed/destroyed such that the device will _never_ go online to do an insta…
-
Some resources are downloaded and executed directly from third-parties.
For example in `deploy_app_buildspec.yml` of `tintulip/pipelines` the `master` version of the `ecs-deploy` script is automat…
-
## Group overview
FDC3 revolves around several types of independent entities:
- Applications
- Desktop Agents
- App Directories
- Users
Each of these has an identity, and needs to know and…
-
Please share any thoughts about what went well, what could be done differently etc. here.
-
https://www.owasp.org/index.php/Top_10_2013-Top_10
http://www.cvedetails.com/vendor/12043/Rubyonrails.html
We should begin to learn from the lessons of other web frameworks and review our own code fo…
-
A rough list of functions and utilities I'd like to add to the package. Recommendations welcomed!
🚧 = under construction
💡 = still just a pipedream
#### Visualisations
💡 [Post-match odds base…