-
The framework needs an effective way of quantifying how much privacy is leaked as a function of topology/collaboration approach between nodes. Additionally, this requires integrating existing well-kno…
-
### Describe the false positive and how to replicate it
i think grim has stored client-side entities' states but idk why it false
### Grim version
latest
### Server version
server 1.8.9
client 1…
-
### Describe the false positive and how to replicate it
This behaviour is hard to reproduce. It happens in fights after hitting someone or while trading hits.
When it does flag it flags exactly …
-
Provide a list of App Catalog groups
-
Display list of App Catalog Groups
-
### Describe the desired feature
I've been looking at what CPU time is getting spent on when running the unit tests, and according to Valgrind's Callgrind tool, roughly 20% of the time is spent simul…
-
Running a fire simulation with extended attack enabled, I am having varying results, by as much as 2x the acreage by changing the SIMULATION_DTMAX parameter. Looking at the source code, I think the i…
-
The Ethereum networking layer has been attacked several times. Py-libp2p and more generally libp2p would benefit from protection against [common attacks on peer to peer networks](http://www.dcs.gla.ac…
-
### Describe the bug
When performing Security.AttackSimulation.Simulations.PostAsync(), the return type is stated to be Simulation, this is wrong.
![image](https://github.com/user-attachments/asse…
-
1. Workout description
2. Workout the maths
3. Implement UI
4. Create video