-
-
I see some hardlnks into clearnet in the sources.
It's very bad when such an important task as user identification is provided by some outside authority and not by ZeroMet itself.
Is there already wor…
zavok updated
2 years ago
-
_Also known as whitelists, blacklists, blocklists, deny lists, etc._
For many reasons, it's important for people operating IPFS nodes to have the option of specifying which content they will, or wo…
-
In some instances a group of documents inside an EDV may have a common level of access meaning they could be encrypted with a common encryption key and that encryption key is then encrypted once (via …
-
Hi,
I'm not quite sure if i should post this here (js-ipfs) or here https://github.com/ipfs/ipfs as an api update.
Please do correct me if it doesn't belong here.
Yesterday i wrote a [Push noti…
-
AppImage is all about easy and secure software distribution for Linux right from the original upstream application author directly to the end user, without any intermediaries such as Linux distributio…
-
https://geti2p.net/en/about/software
When you install the I2P software made available at geti2p.net, you are actually installing an I2P router and an accompanying bundle of basic applications. The …
-
A wealth of applications require strong authentication and long-lived secure identities. The Internet requires a common continuously evolving strong identity layer. This would make the Internet safer,…
-
Its great that you've created this and open sourced it. However, serving this online is very problematic:
* At any time, the owners of coinb.in could silently switch out the served code with malici…
-
This issue is to track security concerns about pgp.asc's key distribution model. The pgp.asc website doesn't actually talk about the weaknesses of the model, and even goes as far as to say "absolutely…