
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 6 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server application system web list video marine create data experience description tutorial explanation technology build article blog learn world project boat download windows security lookup free performance javascript technical control network beautiful london support tools course file research purchase library programming image youtube example php construction html install community opensource quality computer profile feature power browser music platform mobile user process work database share manage hardware professional buy industry internet advice dance developer installation 3d access customer camera travel search material standard test documentation review css money engineering develop webdesign engine device photography digital api speed source program management event phone discussion question simple client story water marketing content yacht app setup package interface fast idea account communication cheap compare script study easy live market google resource operation startup monitor training
Tag selected: disclose.
Looking up disclose tag. Showing 6 results. Clear
Saved by uncleflo on February 12th, 2022.
Without the ability to keep secrets, individuals lose the capacity to distinguish themselves from others, to maintain independent lives, to be complete and autonomous persons. This does not mean that a person actually has to keep secrets to be autonomous, just that she must possess the ability to do so. The ability to keep secrets implies the ability to disclose secrets selectively, and so the capacity for selective disclosure at one’s own discretion is important to individual autonomy as well. Secrecy is a form of power. The ability to protect a secret, to preserve one’s privacy, is a form of power. The ability to penetrate secrets, to learn them, to use them, is also a form of power. Secrecy empowers, secrecy protects, secrecy hurts. The ability to learn a person’s secrets without his or her knowledge — to pierce a person’s privacy in secret — is a greater power still. Cell phones are like a drivers license. It is really hard to function in the modern world without one, but they reveal a lot of information about you that you might not want to share.
secret disclose penetrate disclosure surf discretion privacy clue selective pierce autonomous ability possess surveillance reveal entity learn preserve enforcement lose person license trail protect cell share internet resource safety power knowledge function information
Saved by uncleflo on January 16th, 2022.
Connect and share knowledge within a single location that is structured and easy to search. Being the good citizen I am, I left-click on the "Safely Remove Hardware" icon in my taskbar, and select my USB drive to dismount. Then I get the message: Windows can't stop your Generic volume device because it is in use. Close any programs or windows that might be using the device, and then try again later. Of course, being the Operating System, it knows exactly what applications are using my device. So why won't it tell me? Or is there a way that I can find out?
eject unmount graceful click remove overflow query stack explorer disclose partition windows drive file scan device answer connect knowledge howto question structure search safely hardware generic program system message block problem solution administration
Saved by uncleflo on January 16th, 2022.
Motor Vehicle Maintenance & Repair Stack Exchange is a question and answer site for mechanics and DIY enthusiast owners of cars, trucks, and motorcycles. It only takes a minute to sign up. Connect and share knowledge within a single location that is structured and easy to search.
answers stack overflow disclose enthusiast answer structure mechanics repair maintenance question knowledge build construction car engine howto help guide instruction information anwser diy search motor vehicle
Saved by uncleflo on May 11th, 2021.
Developer-first Cloud Native Application Security. Loved by both developers and security teams: Find vulnerabilities while you code, with IDE and SCM integrations. Fix quickly and early, with automated remediation and actionable insight. Prevent introducing new vulnerabilities into your code base through new dependencies and code changes. Monitor with reporting and alerts providing visibility of application security posture across development teams. Manage with security and license policies and contextual prioritization defined and customized across the organization
actionable vulnerability fix insecure scanner container securely pricing alerts disclose documentation cloud visibility dependency developer automatically govern compliance coding security secure database license application code proprietary platform learn insight automate privacy infrastructure manage enhance kit howto love webdevelopment online internet
Saved by uncleflo on December 28th, 2017.
ING's zero knowledge range-proof precompiled contract for the go-ethereum client. One fundamental concern in blockchain technology is the confidentiality of the data on the blockchain. In order to reach consensus between all independent nodes in a blockchain network, each node must be able to validate all transactions (for instance against double-spent), in most cases this means that the content of the transactions is visible to all nodes. Fortunately several solutions exist that preserve confidentiality on a blockchain (private transactions, HyperLedger Fabric Channels, Payment Channels, Homomorphic encryption, transaction-mixing, zero knowledge proofs etc.). This article describes the implementation of a zero-knowledge range-proof in Ethereum. The zero knowledge range proof allows the blockchain network to validate that a secret number is within known limits without disclosing the secret number. This is useful to reach consensus in a variety of use cases: Validate that someone's age is between 18 and 65 without disclosing the age; Validate that someone is in Europe without disclosing the exact location; Validate that a payment-amount is positive without disclosing the amount (as done by Monero). The zero-knowledge range-proof requires a commitment on a number by a trusted party (for instance a government committing on someone's age), an Ethereum-user can use this commitment to generate a range-proof. The Ethereum network will verify this proof.
official golang implementation ethereum cryptocurrency library zero range proof validation commit verify transaction encryption description knowledge blockchain network number limit europe location disclose trust solution confidential ing payment
Saved by uncleflo on August 4th, 2014.
The amendment and extension of the Mutual Defence Agreement, which was first signed in 1958, is fundamental to the replacement of the Trident nuclear weapons system: allowing for the transfer of information relating to nuclear technology and US-UK collaboration over their nuclear weapons programmes. Yet the British Government has not only denied Parliament the opportunity to discuss it, it will not even disclose the content of the agreement.
programme nuclear britain pariliament secret prime minister government undisclosed weapon collaboration mutual defence agreement trident system information deny parliament discuss disclose uk content ammendment transfer technology
No further bookmarks found.