-
I would argue bullets i-iv & vi describe requirements for the implementation of a wallet while only v is about the protocol between wallet and verifier. I suggest to add the following requirements:
…
-
# 1. 임시 보안 자격 증명
- MC-IAM-MANAGER는 각 지원하는 CSP와 연동되어 임시 보안 자격증명을 제공한다.
- 사용자는 role에 따라 권한이 제한된 임시 보안 자격증명을 발급 받을 수 있다.
- 토큰은 사용 용도에 따라 만료일자를 최대한 제한한다.
# 2. CSP 별 지원 현황
- 아래 표에서 최신화
| 구분 | IDP…
-
If a user imports a role, make sure that role does not override expected behavior.
-
Hello Keller,
In the paper "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (Usenix Security 2023), the authors point out that the truncpr protocol proposed …
-
Some API's still use old protocols that refuse to work by default in .NET, please add:
```
ServicePointManager.SecurityProtocol = SecurityProtocolType.Ssl3 | SecurityProtocolType.Tls | SecurityProto…
-
The gsi and ztn authentication protocols are documented but none of the other protocols are. The host, krb5, pwd, sss, and unix protocols should be documented as well.
-
A2-security
Medium
# Inconsistent Application of Reserve Factor Changes Leads to Protocol Insolvency Risk
## Summary
The ZeroLend protocol's `PoolFactory` allows for global changes to the `reserve…
-
### Preconditions
Need to release Python SDK support 2024-07-01
### Related command
Please see v1 https://github.com/Azure/azure-cli/issues/27729 , this v2 involves deleting a parameter (proxy…
-
Security Notions for Fully Encrypted Protocols
Ellis Fenske, Aaron Johnson
https://censorbib.nymity.ch/#Fenske2023a
[PDF](https://github.com/user-attachments/files/16566156/foci-2023-0004.pdf)
T…
-
### Asking a question, not reporting a bug
* [x] This question is not about a bug
### Is there an existing issue for this?
* [x] I have searched the existing issues
### Berty product
Mobile app
###…