Tonimir Kisasondi

Results 5 comments of Tonimir Kisasondi

1) Dump linkcrawl output to a file. 2) Run linkcrawl on the output with the help of cat and xargs. :)

Under 0x10-V1-Architecture under V1.6 Cryptographic Architecture i considered adding something like: "Verify that all selected cryptographic systems, protocols, algorithms or modes of operation are appropriate for the application's threat model...

Thanks for the feedback! I would suggest that we don't specify algorithms or modes, but focus on the result we want to achieve. And the only way for anyone who...