-
Currently our draft states (slightly revised text in my working branch) for ML-KEM cmposite encryption:
> Note that unlike most public-key algorithms, in the case of a v3 PKESK packet, the symmetri…
-
to: @necolas
This is mostly in response to #31, but also just something I've been thinking about for some time, and is a proposal for a path to building a real production-quality ecosystem for buil…
-
Currently, the `statefile{}` block only affects the state *cache* file located at `./terraform/terraform.tfstate`, but not the local state file located at `./terraform.tfstate`. In contrast the `backe…
ghost updated
6 months ago
-
currently LinuxCNC classic uses INI files for configuration information. This assumes a common filesystem and will generally not work a distributed setup.
Related problems are: persistent values (st…
-
The unused encryption keys, such as the Initial key, should be discarded once QUIC has moved to the Handshake encryption level (https://www.rfc-editor.org/rfc/rfc9001#name-discarding-unused-keys), sam…
-
Hi! I believe this is realted to #14 (which I wasn't able to re-open).
I am running v2.3.2, and I have tried everything under the sun to access the certificate repo to no avail.
```
(...)
+--…
-
## Links
* Signal Post: https://signal.org/blog/help-iran-reconnect/
* Their Repository: https://github.com/signalapp/Signal-TLS-Proxy
* Our Original Issue: https://github.com/signalapp/Signal-TLS-…
-
As we're working with crypto at Status, we regularly get bitten by the different types in Nim libraries to represent binary data.
# Context:
Crypto and hashing libraries in the wild uses arrays …
-
E.g. to see what a secure construction is.
-
## Motivation
CoCo’s threat model excludes the Kubernetes Control Plane and Host components from the Trusted Compute Base (TCB). With this stricter threat model, CoCo runtimes cannot take advantage …