-
### What happened?
When trying to place a pillar the size change automatically.
### Attach your screenshots
https://github.com/user-attachments/assets/8de072fa-e93f-4f76-b9a2-debe1034e3ab
##…
-
# LANL HPC Security Pillars
LANL systems face significant security threats, both insider and outsider. I'm hoping to state the basic considerations for a shared HPC resource and allow others to rev…
-
I would argue bullets i-iv & vi describe requirements for the implementation of a wallet while only v is about the protocol between wallet and verifier. I suggest to add the following requirements:
…
-
I'm not sure what the security objective of this section is. I guess it is about the authenticity and trustworthiness of the wallet?
If so, I would suggest to spell that out and also describe how t…
-
### New feature motivation
### New feature motivation
The goal it's to get the AWS Performance Pillar Framework compliance framework for the AWS provider.
### Solution Proposed
Add the complianc…
-
Add these functions to utils. I'm most interested in Interests because I can total them up on the meta page and see which interests don't have an icon but should do.
All should go into utils as pur…
-
Identity
Devices
Networks
Applications
Data
Cross Cutting
-
"Preventing Misuse of Data: By giving users the ability to manage consent, it reduces the risk of data misuse. Holders can withdraw consent if they believe their data is not being used appropriately."…
-
"Backup and Recovery: A robust key recovery system, or process, is critical to ensure users can regain access to their wallet(s)if the private keys are lost or compromised"
Can you please shed some…
-
In section "Privacy of Wallet Transactions" there are several instances of a "must" requirement that (in my opinion) cannot always be fulfilled.
Examples:
"i. Code providers and contributors and/or…