[ON HOLD] "Easily" write MLA papers in Markdown
google maps for block game
fork of bitcoinjs' bip39 library for sending patches upstream
Secure Bitcoin price feed based on TLS-N proofs.
browser extension to improve display of TLS certificate status
An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
ClinicCases is a web-based case management system designed specifically for law school clinics
A firefox addon enabling CORS everywhere by altering http responses.
In which part of the interface would this feature applies?
[ ] 1. Load your data [ ] 2. Choose a chart [x] 3. Mapping [ ] 4. Customize [ ] 5. Export
(I'm not actually sure what stage this would be appropriate in. It's a variant of the Bar Chart graph, so maybe error bars would be additional columns during the Mapping stage?)
Is your feature request related to a problem? Please describe.
I was going to graph some data with confidence intervals, but that's not supported!
Describe the solution you'd like
I'd like to graph some data including the error bars.
Describe alternatives you've considered
The only real alternatives would be adding the upper and lower bars as secondary columns.
(No context appropriate; this is a fully general request)
created time in a month
started time in 2 months
fork in 2 months
PR opened Legrandin/pycryptodome
I'm unclear what this means as-written. Are you referring to key-reuse while randomizing the nonce for each message?
pr created time in 2 months
commit sha 73db840ef5949a14b8b43d593fc2a330a37af49c
push time in 2 months
The url fragment seems kinda hacky
While I agree, it's apparently also what PyPI uses...
script author should host the file on their own server or some servers which can be trusted.
This is a nice idea in theory, but very few people run their own server, and CDNJS is so convenient to use and is arguably more clear than script-author-hosted imports as to what exactly is being included. (I'd be interested to see some statistics on CDN usage from, say, the admin of Greasyfork.)
MD5 checksum do not make it more secure due to collision attacks.
Setting aside the fact that these collision attacks generally require an attacker-crafted library in the first place (no useful general preimage attack yet exists for MD5), this is trivially fixed by the script author choosing to instead use SHA-256 for subresource integrity; an attacker in a position to sub a weaker algorithm in could just as easily sub in malicious code in directly, so it's somewhat moot from an implementation standpoint anyway.
comment created time in 2 months
I see this was resolved -- does the documentation need to be updated?
Nowhere does it currently show how to represent function return value annotations
comment created time in 3 months
started time in 3 months