-
Bonjour,
Il reste le souci d'encryption et de comparaison avec des clef publiques qui se trouvent sur un serveur gouvernemental.
Ce sont les points determinants afin dobtenir le "vert":
-Vacc…
-
# Handle
gpersoon
# Vulnerability details
## Impact
Suppose one of the supplied addrs[i] to the constructor of Identity.sol happens to be 0 ( by accident).
In that case: privileges[0] = 1
Now su…
-
Hi folks (@hoeteck @sergeynog @zhenfeizhang):
I have a concern about subgroup checks in the aggregate signature case.
- The `Aggregate` function (defined in Section 2.8) does not validate subgro…
-
As we all know, today more than ever before, it is crucial to be able to trust our computing environments. One of the main difficulties that package maintainers of GNU/Linux distributions face, is the…
-
As we all know, today more than ever before, it is crucial to be able to trust our computing environments. One of the main difficulties that package maintainers of GNU/Linux distributions face, is the…
-
We should add
```java
expandBorder( final RandomAccessibleInterval source, final long border )
```
(etc) to accompany
```java
expandBorder( final RandomAccessibleInterval source, final long... b…
-
People sometimes put them in for debugging - should have a lint check for them.
-
As suggested by Jeremy Daily in review of the conceptual draft, the check values should be signatures and not just checksums
-
### Use Case
This is a proposal for a piece of syntax sugar. It does not fundamentally change the type system.
Suppose you have a situation where an API accepts a function whose parameter is an op…
-
**User Story**
As a consumer of OCI images from the internet, I'd like be to be sure that the image I'm running on my production servers within my perimeter are, in fact, what I think they are. By c…