Results 90 comments of cobratbq

_Updated description to include rationale_: if we use a piece of unique information from the partition/LUKS, we ensure that both the security key and the partition need to be accessible...

Could you clarify what the goal is that you have in mind? (What are you trying to accomplish?) For example, if I understand correctly, you're requesting to have a list...

If I understand you correctly, the bypass list would only make sense for `relay`, that is: all connections go through `relay` proxy, but `relay` chooses to connect directly if address...

I've been considering your request. The request seems simple enough, although I am not sure if it will match domain names if you specify only a list of CIDRs for...

A long time ago, I had a look at that. AFAICT there are very scarce resources that explain how the ICQ protocol handles passwords nowadays. At the time, I could...

Some resources I found that describe what seems to be the ICQ protocol. (I don't have any clue about their authenticity, but it's a start.) I'll have a look later...

I'll have a look at this. I may be able to pick this up.

@ibauersachs do we still have binary builds of nightly? I'm thinking it's easiest to build the flatpak from an existing binary archive, so: unpack JRE + unpack Jitsi + make...

I had a quick look at this one. It seems RFC 5754 assumes an identifier is included to indicate what hash algorithm was used. So for a plain signature as...

> 'd follow what was done for the RSA crate: turn the Digest into the generic type argument for the Signer and Verifier implementations: [..] This does mean that, within...