-
Hi Lei,
I just came across your RIBLT paper and for the most part I thought it was compelling and clear, and the scheme described has tremendous potential. However, I believe it contains a misunder…
-
Create Threat Model guide
-
A key vault is a service that can be used to manage keys needed to encrypt/decrypt data. They can improve data security by removing the need for a process that needs to send/save encrypted output or r…
-
Document: https://hackmd.io/@M_jNX2MrSVuhJwhDnKOLHg/Hk-E22bLA/edit
-
https://honey.niceland.tech/
We need the above webpage turned into it's own section under "other services" > "threat intelligence"
-
The ARF 2.1 states that it provides "high-security authentication" -- but there are no details on what that is, or how it is accomplished. Account protection is hard. Large providers today (Amazon, Ap…
-
_[Threat Modeling mode, consider this a work in progress, and it may be moved somewhere. Contributors welcome!!!]_
# Introduction
## Status of this document
An outline of the many concerns re…
-
## What is missing or needs to be updated?
There is no alternative to the "System Modeling" section
## How should this be resolved?
Text to add as a subsection for "System Modeling", just…
sebob updated
2 weeks ago
-
# We received a GDPR violation notice :)
We received a GDPR violation notice :) - Saturday, 26 August 2023 - Jitbit Software blog'
[https://www.jitbit.com/news/gdpr-threat/](https://www.jitbit.com/n…
-
#### System information
There are sereval vulnerability threats exist in this project's dependency, hope solve these problems.
```
Dependency go:github.com/consensys/gnark-crypto:v0.10.0 is vulne…