-
Does the project implement the applet part?
-
We have tested a large number of keys from various vendors and have found significant issues in NK2 and NK3.
This is a very broad issue, and unfortunately it will necessitate a large number of chan…
-
actual versioned databases:
https://pijul.org/
https://lakefs.io/ (no real merging option)
https://github.com/Oxen-AI/oxen-release (purpose built for ml stuff, cool ideas)
https://github.com/dol…
-
So that ...
1. a print version of a page on https://freeolabini.org/ can show the revision it was pertinent to
2. the source for the site become a living tamper-evident timeline for the episode in…
-
The possibility exists for tampering to occur in the time elapsed between an object's publication, and the Bitcoin transaction in which that published version's hash is embedded, is confirmed.
A user…
-
For some use cases it is important to know to what extent the wallet or agent operates on holder keys under sole control of an authorized end-user. This knowledge can be provided with more or less ass…
-
Submitting on behalf of my group of five University of Nebraska - Omaha Cybersecurity Masters students for our Software Assurance class project:
We reviewed Elasticsearch as part of our class proje…
-
# Feature request
## Description
It would be good to have guidelines and examples on how to deal with physical security protocols (is it a proper English way to say that ?). For instance: **you …
-
The developers for Tor Messenger plan to add support for CONIKS - an end-user key management and verification system for end-to-end secure communication that has tamper-evident, publicly-auditable key…
-
How can I *set* the status register write disable (SRWD) and block protect (BP0/BP1) bits in order to write-protect a flash chip?
I see plenty of code for *disabling* write protection, but I want t…