-
**About SecurityWeek Cyber Insights \|** _At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security is…
-
### NetBox version
v3.0.10
### Feature type
New functionality
### Proposed functionality
For lack of a better term, it would be ideal to support the common model of virtual device context. This …
-
See #14
Let people use Choco over Tor automatically to query the repository and install packages over Tor. Automatically. Not Manually.
Please this is just a few checkboxes in CloudFlare ... I…
ghost updated
2 years ago
-
I would like to create and publish a threat model for one of your apps. I have several related questions:
- Would that be OK?
If so:
- I was considering Simple Gallery. Is there a different a…
-
### Steps to reproduce the issue
The media field used to select images is now encoding image metadata into the field. For instance, when you select an image, it produces this value:
`images/bann…
-
Add Functional threat modeling (abuse cases) possibility
-
On the previous version of the website there used to be a reading list, this seems to be missing now. Can we add this back in or was there a reason it was dropped @tomaroberts ?
In the meantime, I'…
-
# Problem
For identity (signatures) and encryption purposes, the user needs access to a key pair, therefor referenced to as _Waku keypair_.
There is currently no straightforward solution possibl…
-
-
**Extended Description**
- As a ... , in order to ... , I want ...
**Preconditions**
There is no in-document link to the SAR from the POA&M. Until and unless this has an established element and/…