- Nov 2022
-
security.stackexchange.com security.stackexchange.com
-
From the Introduction to Ed25519, there are some speed benefits, and some security benefits. One of the more interesting security benefits is that it is immune to several side channel attacks: No secret array indices. The software never reads or writes data from secret addresses in RAM; the pattern of addresses is completely predictable. The software is therefore immune to cache-timing attacks, hyperthreading attacks, and other side-channel attacks that rely on leakage of addresses through the CPU cache. No secret branch conditions. The software never performs conditional branches based on secret data; the pattern of jumps is completely predictable. The software is therefore immune to side-channel attacks that rely on leakage of information through the branch-prediction unit. For comparison, there have been several real-world cache-timing attacks demonstrated on various algorithms. http://en.wikipedia.org/wiki/Timing_attack
Further arguments that Ed25519 is less vulnerable to - cache-timing attacks - hyperthreading attacks - other side-channel attacks that rely on leakage of addresses through CPU cache Also boasts - no secret branch conditions (no conditional branches based on secret data since pattern of jumps is predictable)
Predicable because underlying process that generated it isn't a black box?
Could ML (esp. NN, and CNN) be a parallel? Powerful in applications but huge risk given uncertainty of underlying mechanism?
Need to read papers on this
-
More "sales pitch" comes from this IETF draft: While the NIST curves are advertised as being chosen verifiably at random, there is no explanation for the seeds used to generate them. In contrast, the process used to pick these curves is fully documented and rigid enough so that independent verification has been done. This is widely seen as a security advantage, since it prevents the generating party from maliciously manipulating the parameters. – ATo Aug 21, 2016 at 7:25
An argument why Ed25519 signature alg & Curve 25519 key exchange alg is more secure; less vulnerable to side attacks since the process that generates is have been purportedly verified and extensively documented.
-
-
www.nationalchickencouncil.org www.nationalchickencouncil.org
-
US : broiler exports as a % of total production : 1.5% to 15%+
what is the same ratio for India / China
-
- Oct 2022
-
wgu-nx.acrobatiq.com wgu-nx.acrobatiq.com
-
facilitate conflict resolution, improve decision-making, and sharpen patient and family assessment skills.
IMPORTANT
-
skills can impact how you perceive yourself and others, communicate with others, cope with change and challenge, and create a culture of safety and collaboration is vital to nursing practice and leadership
IMPORTANT
-
- Sep 2022
-
github.com github.com
-
that is the key difference
-
- Aug 2022
-
Local file Local file
-
If akey is lost, this invariably means that the secureddata asset is irrevocably lost
Counterpart, be careful! If a key is lost, the secured data asset is lost
-
Theowner of a resource is by definition the one hold-ing the private encryption keys.
definition of "owner of a resource"
-
-
-
都是可以根据 RoutingKey 把消息路由到不同的队列
direct模式下,同一个routingkey可以绑定不同的queue,这样路由器可以分别发送同样的消息到相应的两个queue中
-
- Jul 2022
-
gist.github.com gist.github.com
-
4.5 Getting the right people in the right roles in support of your goal is the key to succeeding at whatever you choose to accomplish.
4.5 Getting the right people in the right roles in support of your goal is the key to succeeding at whatever you choose to accomplish.
-
- May 2022
-
Local file Local file
-
At the time I wasa a web designer with a focus on usability and user interfaces. I executed Json's design direction for key features of the app and collaborated with him to fill in details of the concept.
-
- Apr 2022
-
code-examples.net code-examples.net
-
The difference between a non- lateral and a lateral join lies in whether you can look to the left hand table's row.
-
-
-
Kernel is already defined by Ruby so the module cannot be autoloaded. Also, that file does not define a constant path after the path name. Therefore, Zeitwerk should not process it at all.
-
-
edgeguides.rubyonrails.org edgeguides.rubyonrails.org
-
Every element of config.autoload_paths should represent the top-level namespace (Object).
-
-
github.com github.com
-
The core benefit of Marginalia is being able to decorate SQL queries with details of the context of the source of the query.
-
-
craigmod.com craigmod.com
-
The Hori key enters a Hori lock in such a way as to affirm your suspicion that every key you’ve ever inserted into every lock throughout your entire life was a sham. A false combination — jittery, sticky, imprecise. You realize how badly cut, forged by shoddy means, all the keys you own currently are. Using this Hori key and lock combination is similar to how you might have felt the first time you ever touched a masterfully finished piece of wood — shock at that glassy smoothness you didn’t think could be brought out from the material. The key enters. Within perfectly milled chambers, the driver pins — attenuated by precisely tensioned springs — push against the key pins as the key slides forward in the keyway. The driver pins align to a dead-straight shear line and you feel the key settle with a satisfaction of a meticulously-measured thing spooning its Platonic opposite. Then you twist. The movement of the bolt away from the frame is so smooth — the door having been hung by some god of carpentry with the accuracy of a proton collision path — that you gasp, actually gasp, at the mechanism.
I love the visceral way Craig Mod describes these Hori key/lock mechanisms. Makes me want to go out and buy one.
-
-
ecampusontario.pressbooks.pub ecampusontario.pressbooks.pub
-
9.2. Describe general cell signaling strategies and explore the different types of cell surface receptors and singling molecules.
9.2 Key Concepts
Chemical Signaling: * Intracellular vs. Intercellular * types of chemical signaling
Receptors: * internal vs. surface-cell * categories of surface-cell receptors
Ligand Molecules: * hydrophobic * water-soluble * nitric oxide (NO)
Work Cited
Hinic-Frlog, S., Hanley, J. and Laughton, S. (2020). Introductory Animal Physiology. Missausgua, CA: Pressbooks.
-
- Feb 2022
-
bugs.ruby-lang.org bugs.ruby-lang.org
-
The remaining problem should be how to declare Ruby-define methods to be 'non-block taking'. Under the current language spec, absence of '& argument' may or may not mean the method would take a block.
-
-
www.chronicle.com www.chronicle.com
-
No. 1 resource you have inherent in a professor is the latent cognitive capacity to instruct, mentor, and produce original ideas, and that we should take that resource very seriously
Tags
Annotators
URL
-
- Jan 2022
-
www.acf.hhs.gov www.acf.hhs.gov
-
Family child care (FCC) refers to regulated (licensed, certified, or registered) HBCC. Family, friend, and neighbor (FFN) care refers to HBCC that is legally exempt from licensing or other regulation, whether paid or unpaid. FFN care includes care given by grandparents, other relatives, and non-relatives. Home-based child care (HBCC) providers are a heterogeneous population of providers who offer care and education to children in their own or the child’s home. (Although we use “HBCC” throughout the report, we recognize the role providers play both caring for and educating children.) Providers’ HBCC status is fluid, and individuals’ roles may change—those who care for a few children who are related to them, whether with or without pay; those who offer care as a professional occupation and a business; those who care for children over many years; and those who care for children sporadically in response to changing family needs. We assume a variety of factors influence these patterns, which may shift over time.
Essential knowledge for SECURE lab
-
HBCC is the most common form of nonparental child care for infants and toddlers
Notice the particular importance of HBCC for infants and toddlers (i.e., approximately birth to age three years).
-
HBCC includes regulated (licensed, certified, registered) family child care (FCC) and care legally exempt from regulation (license-exempt) that is provided by family, friends, or neighbors (FFN).
these are KEY TERMS for our project - learn these terms and acronyms: FCC and FFN are part of HBCC
-
-
-
You have to be doing 80% of the hard work, which means making the conscious effort to avoid the design flaws that will exclude people from using your product
-
-
stackoverflow.com stackoverflow.com
-
The difference is what the server expects the client to do next.
-
-
-
Mabry says if you own a Hyundia or Kia, you better add extra security so you don't become the next target.
Apparently, there is an issue with key fob security on 2020 Kia Sportage and Hyundai models.
Also, Columbus Police and 10TV don't know how to spell Hyundai or use spell check.
-
- Dec 2021
-
chem.libretexts.org chem.libretexts.org
-
only about 1% of carbon atoms are C-13. These are the only ones picked up by this form of NMR. If you had a single molecule of ethanol, then the chances are only about 1 in 50 of there being one C-13 atom in it, and only about 1 in 10,000 of both being C-13. But you have got to remember that you will be working with a sample containing huge numbers of molecules. The instrument can pick up the magnetic effect of the C-13 nuclei in the carbon of the CH3 group and the carbon of the CH2 group even if they are in separate molecules. There's no need for them to be in the same one.
the author believe that even though the percentage of C-13 is low, but its NMR signal can be captured.
Tags
Annotators
URL
-
-
www.revistadelauniversidad.mx www.revistadelauniversidad.mx
-
violencia de género
«Todo acto de violencia sexista que tiene como resultado posible o real un daño físico, sexual o psíquico, incluidas las amenazas, la coerción o la privación arbitraria de libertad, ya sea que ocurra en la vida pública o en la privada».
-
Esa “formación” del hombre, que lo conduce a una estructura de la personalidad de tipo psicopático
No existe un perfil único de maltratador. Tampoco se trata de hombres agresivos ni de psicópatas. Nuestro estudio pone en cuestión los estereotipos relacionados hasta ahora con la conducta y los rasgos del maltratador, como puede ser el consumo de sustancias tóxicas y de alcohol, la vivencia de experiencias traumáticas en la edad infantil o los problemas psíquicos. En este último aspecto, los datos del patrón de personalidad de un grupo de maltratadores basados en el inventario clínico multiaxial Millon-II señalan a la compulsividad como rasgo más destacado de estas personas; no obstante, el percentil no supera el grado de normalidad, por lo que se descarta la posibilidad de una psicopatología.
Tags
- https://d1wqtxts1xzle7.cloudfront.net/32507942/Articulo-Violencia-de-genero-with-cover-page-v2.pdf?Expires=1638439241&Signature=avNx3VDNgoVTeDQhplcjjsef-5wgNLidAfL9OVPf-c-fIQlaeA5SWMAoe43iQtRGMM16pVG12ynOjDz~KA9cNE43F2o1EnAlEBYOgiIzKGKQRFow1st9ZdwRC2iopD6IrCXzzJIprK5awkhFk9-00~izfVh~yLjLLnXPtQ45KGha45vMpuoiVjsi-MQZjqN6S-QvWjCfvuikvMzeCzRf0FGuHqiOpl-KZHzgPWm5XFuEr6g0-Uh4GhuzjvMDbqLSNdgbfUHQhz6s8l1jsOEyoYZPokD2dbLe50WWdbdku4x23zrDlIaTQjeE4ZC3LGkTEx7OIO~pXxC-R3zENG~2gg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA Pag 2
- https://d1wqtxts1xzle7.cloudfront.net/32507942/Articulo-Violencia-de-genero-with-cover-page-v2.pdf?Expires=1638439241&Signature=avNx3VDNgoVTeDQhplcjjsef-5wgNLidAfL9OVPf-c-fIQlaeA5SWMAoe43iQtRGMM16pVG12ynOjDz~KA9cNE43F2o1EnAlEBYOgiIzKGKQRFow1st9ZdwRC2iopD6IrCXzzJIprK5awkhFk9-00~izfVh~yLjLLnXPtQ45KGha45vMpuoiVjsi-MQZjqN6S-QvWjCfvuikvMzeCzRf0FGuHqiOpl-KZHzgPWm5XFuEr6g0-Uh4GhuzjvMDbqLSNdgbfUHQhz6s8l1jsOEyoYZPokD2dbLe50WWdbdku4x23zrDlIaTQjeE4ZC3LGkTEx7OIO~pXxC-R3zENG~2gg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA PDF. Pag. 5
Annotators
URL
-
- Nov 2021
-
towardsdatascience.com towardsdatascience.com
-
The Query word can be interpreted as the word for which we are calculating Attention. The Key and Value word is the word to which we are paying attention ie. how relevant is that word to the Query word.
Finally
-
-
unix.stackexchange.com unix.stackexchange.com
-
That's not how flatpack works; the executable is hidden in a container and you need to set up the whole environment to be able to call it. Delivering a well-isolated, not-to-be-run-from-outside environment is the whole point.
-
- Sep 2021
-
www.digitalocean.com www.digitalocean.com
-
By connecting over an SSH tunnel, you’re limiting VNC access to machines that already have SSH access to the server.
-
-
www.vox.com www.vox.com
-
People should also consider visiting a sleep medicine physician
-
lack of sleep is about lack of time.
-
-
www.npr.org www.npr.org
-
flavored vaping products
Breathing in flavored nicotine product through a device. The device is... (need to look up)
**Need to find a good description of a vape product
-
Food and Drug Administration
Important term to understand - What do they do, are they part of the government, how do they regulate things?
-
-
static1.squarespace.com static1.squarespace.comAbbyy2
-
This may be the sine qua non of rhetoric: theart of linguistically or symbolically creating salience.
Salience: importance
-
Weltanschauung
Weltanschauung: worldview. German.
-
-
static1.squarespace.com static1.squarespace.com
-
medium thinking
Okay, so medium design/thinking is considering the backdrop against which one's subject matter is situated.
-
-
static1.squarespace.com static1.squarespace.com
-
COMPLICITY
I have heard this term used a lot in the last four years. Even when I was unsure what the word precisely meant, I understood it to have negative connotations. OED defines complicity as, "the state of being involved with others in an illegal activity or wrongdoing." If Miller is using the term in this way than that's a pretty risky way to title his piece. It implies that the structure of academia is corrupted.
-
-
-
Matthews, D. (2021). Drowning in the literature? These smart software tools can help. Nature, 597(7874), 141–142. https://doi.org/10.1038/d41586-021-02346-4
-
-
blogs.bmj.com blogs.bmj.com
-
People’s Covid Inquiry: Impact of covid on frontline staff and key workers—The BMJ. (n.d.). Retrieved September 1, 2021, from https://blogs.bmj.com/bmj/2021/08/27/peoples-covid-inquiry-impact-of-covid-on-frontline-staff-and-key-workers/?utm_campaign=shareaholic&utm_medium=twitter&utm_source=socialnetwork
Tags
- risk assessment
- face mask
- resources
- risk
- PPE
- public transport
- safety
- response
- key worker
- transmission
- work exposure
- protection
- COVID-19
- hospitalization
- UK
- People's Covid Inquiry
- inequality
- wellbeing
- government
- NHS
- is:blog
- mental health
- London underground
- frontline staff
- ventilation
- lang:en
- travel
Annotators
URL
-
- Aug 2021
-
towardsdatascience.com towardsdatascience.com
-
So for each word, we create a Query vector, a Key vector, and a Value vector. These vectors are created by multiplying the embedding by three matrices that we trained during the training process.
-
-
stats.stackexchange.com stats.stackexchange.com
-
I'm going to try provide an English text example. The following is based solely on my intuitive understanding of the paper 'Attention is all you need'.
This is also good
-
For the word q that your eyes see in the given sentence, what is the most related word k in the sentence to understand what q is about?
-
So basically: q = the vector representing a word K and V = your memory, thus all the words that have been generated before. Note that K and V can be the same (but don't have to). So what you do with attention is that you take your current query (word in most cases) and look in your memory for similar keys. To come up with a distribution of relevant words, the softmax function is then used.
-
-
static1.squarespace.com static1.squarespace.com
-
paradigmatic
I was not sure what this term meant in this context. After looking the term up on google, the definition that seems to fit is the denotation of the relationship between a set of linguistic items that form mutually exclusive choices in particular syntactic roles.
-
-
charlypoly.com charlypoly.com
-
It means that when having a type guard:TypeScript and JavaScript runtime are tied to the same behaviour.
-
-
github.com github.com
-
You can't just move 'side-ways' between unrelated types; you need to move either up or down the lattice.
-
-
en.wikipedia.org en.wikipedia.org
-
Isolation ensures that concurrent execution of transactions leaves the database in the same state that would have been obtained if the transactions were executed sequentially
-
- Jun 2021
-
www.mutuallyhuman.com www.mutuallyhuman.com
-
This is why for a recent Angular+Rails project we chose to use a testing stack from the backend technology’s ecosystem for e2e testing.
-
-
www.ibm.com www.ibm.com
-
So, what problem is blockchain solving for identity if PII is not being stored on the ledger? The short answer is that blockchain provides a transparent, immutable, reliable and auditable way to address the seamless and secure exchange of cryptographic keys. To better understand this position, let us explore some foundational concepts.
What problem is blockchain solving in the SSI stack?
It is an immutable (often permissionless) and auditable way to address the seamless and secure exchange of cryptographic keys.
-
-
github.com github.com
-
(load functions call handle directly, there's no intermediate network requests.)
-
-
kit.svelte.dev kit.svelte.dev
-
When fetch runs on the server, the resulting response will be serialized and inlined into the rendered HTML. This allows the subsequent client-side load to access identical data immediately without an additional network request.
-
-
github.com github.com
-
'set-cookie': response.headers.get('set-cookie')
-
- May 2021
-
github.com github.com
-
plus authorization if it's not explicitly provided, to a fetch request that happens inside load to an internal endpoint
Tags
Annotators
URL
-
-
americanaffairsjournal.org americanaffairsjournal.org
-
Moreover, “[r]elations of power are not in a position of exteriority with respect to other types of relationships (economic processes, knowledge relationships, sexual relations), but are immanent in the latter.” Such claims played some role in the rise of a mode of analysis that vastly expands the range of what can be treated as political.
power is everywhere; in every relationship; this is why the range of what is "political" is actually quite vast
-
-
-
responsibly deploy AI systems
-
- Apr 2021
-
www.bio-rad.com www.bio-rad.com
-
the concentration is calculated based on the fraction of droplets that is empty (that is, the fraction that does not contain any target DNA).
-
-
core.tcl-lang.org core.tcl-lang.org
-
github.com github.com
-
first sighting: this file referenced by https://hyp.is/ZD-z8px8Eeue0ws8rEMsrw/gist.github.com/cowboyd/1642793
-
- Mar 2021
-
en.wikipedia.org en.wikipedia.org
-
often in error
Tags
Annotators
URL
-
-
Local file Local file
-
Personal and professional development will follow andultimately these very same characteristics and approaches will naturally transfer intopractice and in direct contact with young people
what we learn when becoming youth workers is transferable to our practice, reflective of the necessity of openness and transparency. when we learn the value of these skills, we can demonstrate their value to the young people, and continue the learning journey together
-
the better a student/youth worker knows himself/herself the more likely he/shewill be able to help others know themselves;
the quality of training and the development of skills will impact on the growth of the young person
-
-
jangawolof.org jangawolof.orgPhrases1
-
Local file Local file
-
trailblazer.to trailblazer.to
-
the Activity component is the heart of TRB
-
- Feb 2021
-
twitter.com twitter.com
-
ReconfigBehSci. (2021, February 8). RT @lakens: @BrianNosek @SLLancaster @siminevazire @hardsci Very cool—And it already has a list of glossaries to build on https://t.co/c9… [Tweet]. @SciBeh. https://twitter.com/SciBeh/status/1359042653539741696
-
-
sobolevn.me sobolevn.me
-
exceptions are not exceptional, they represent expectable problems
-
-
stackoverflow.com stackoverflow.com
-
for term in vt100 linux screen xterm { echo "$term:" infocmp -L1 $term|egrep 'key_(left|right|up|down|home|end)' }
-
-
-
Coronavirus doctor’s diary: Karen caught Covid - and took it home. (2021, January 16). BBC News. https://www.bbc.com/news/stories-55682405
-
-
www.infoworld.com www.infoworld.com
-
That's the whole point of an abstraction layer—to isolate your business logic from a subsystem's mechanics
-
-
www.quora.com www.quora.com
-
So the hard and unsolvable problem becomes: how up-to-date do you really need to be?
-
After considering the value we place, and the tradeoffs we make, when it comes to knowing anything of significance, I think it becomes much easier to understand why cache invalidation is one of the hard problems in computer science
the crux of the problem is: trade-offs
-
-
www.smashingmagazine.com www.smashingmagazine.com
-
The key phrase here is “children of a grid container.” The specification defines the creation of a grid on the parent element, which child items can be positioned into. It doesn’t define any styling of that grid, not even going as far as to implement something like the column-rule property we have in Multi-column Layout. We style the child items, and not the grid itself, which leaves us needing to have an element of some sort to apply that style to.
-
-
via3.hypothes.is via3.hypothes.is
-
The Black Panther Party chose the name because the panther is known to be an animal that never makes an unprovoked attack, but will defend itself vehemently when attacked, and this was symbolic of what the Black Panther Party for Self-Defense stood for
-
black unity and black autonomy were at the core of its platform and program
-
- Jan 2021
-
css-tricks.com css-tricks.com
-
Making literal grids. Like X columns with Y gap between them homegrown framework stuff. grid-gap is wonderful, as gutters are the main pain point of grid systems.
-
-
legacy.reactjs.org legacy.reactjs.org
-
The alternative is uncontrolled components, where form data is handled by the DOM itself.
-
-
tools.ietf.org tools.ietf.org
-
Alice and Bob can then use a key-derivation function that includes K, K_A, and K_B to derive a symmetric key.
public keys included in key derivation.
-
-
www.nytimes.com www.nytimes.com
-
value
-
- Dec 2020
-
www.jstor.org www.jstor.org
-
Universal Grammar (
The theoretical or hypothetical system of categories, operations, and principles shared by all human languages and considered to be innate, as defined by Chomsky.
-
syntact
regarding the formation of sentences
-
-
developers.cloudflare.com developers.cloudflare.com
- Nov 2020
-
github.com github.com
-
docs-prod.vmware.com docs-prod.vmware.com
-
awk '{print $2}' /etc/ssh/ssh_host_ed25519_key.pub | base64 -d | sha256sum -b | sed 's/ .*$//' | xxd -r -p | base64 | sed 's/.//44g' | awk '{print "SHA256:"$1}'
-
-
svelte.dev svelte.dev
-
Assignments to $-prefixed variables require that the variable be a writable store, and will result in a call to the store's .set method.
-
-
dylanvann.com dylanvann.com
-
const useEffect = (subscribe) => ({ subscribe })
-
- Oct 2020
-
www.julian.com www.julian.com
-
Key learnings from this guideYour goal is not to foster the writing habit. Your goal is to fall so in love with ideas that you can’t not write about them. Find your objective and your motivation.Don't fully think through your ideas before writing. It's inefficient. The best way to think is by writing. It compels your brain to connect the dots.Avoid guessing what readers want. Instead, be a proxy: Selfishly entertain and surprise yourself, and you'll entertain and surprise many of them too.Your writing is clear once your thoughts are self-evident.Your writing is succinct once everything unimportant is removed.Your writing is intriguing once the average reader effortlessly makes it to the end. A hook, peak, and satisfying ending are your trifecta of intrigue.Treat feedback as a science. Measure your scores and iterate. Remember that the best feedback often comes from you with fresh eyes.Rewriting your thoughts to be clear, succinct, and intriguing is a lot of work. You won't love writing until you find a way to love rewriting. Make a game out of it.
-
-
github.com github.com
-
learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com
-
ound bite,
Sound bite
-
-
github.com github.com
-
s3.voscast.com:8144 s3.voscast.com:8144
Tags
Annotators
URL
-
-
github.com github.com
-
exec(params) do load path end
So the command being wrapper must be a Ruby file, because this will use
load
to load its source into the interpreter (rather than executing it in a shell (we're already in a shell)). -
-
-
medium.com medium.com
-
The index.js file is the main entry point and imports and exports everything from internal.js that you want to expose to the outside world.
-
The internal.js module both imports and exports everything from every local module in the project
-
Every other module in the project only imports from the internal.js file, and never directly from other files in the project.
-
The crux of this pattern is to introduce an index.js and internal.js file.
-
-
docs.google.com docs.google.com
-
But it’s really hard to see, because our human brains struggle to think about this Clock function as something for generating discrete snapshots of a clock, instead of representing a persistent thing that changes over time.
-
-
-
The readable store takes a function as a second argument which has its own internal set method, allowing us to wrap any api, like Xstate or Redux that has its own built in subscription model but with a slightly different api.
-
-
www.youtube.com www.youtube.com
-
Question: 246 years of disorentation. what is the startsof this disorentation?
- education system in U.S is only MADE for white ppl --> BLACK ppl confuse; wanting to know more of their history.
-
-
www.asante.net www.asante.net
-
marking.
"Whenever a person delineates a cultural boundary around a particular cultural space in human time"
-
Afrocentricity becomes a revolutionary idea because it studies ideas, concepts, events, personalities, and political and economic processes from a standpoint of black people as subjects and not as objects, basing all knowledge on the authentic interrogation of location.
Basically afrocen. Amer. history in the black POV
-
- Sep 2020
-
-
Most simple example: <script> import ChildComponent from './Child.svelte'; </script> <style> .class-to-add { background-color: tomato; } </style> <ChildComponent class="class-to-add" /> ...compiles to CSS without the class-to-add declaration, as svelte currently does not recognize the class name as being used. I'd expect class-to-add is bundled with all nested style declarations class-to-add is passed to ChildComponent as class-to-add svelte-HASH This looks like a bug / missing feature to me.
-
-
github.com github.com
-
The problem with working around the current limitations of Svelte style (:global, svelte:head, external styles or various wild card selectors) is that the API is uglier, bigger, harder to explain AND it loses one of the best features of Svelte IMO - contextual style encapsulation. I can understand that CSS classes are a bit uncontrollable, but this type of blocking will just push developers to work around it and create worse solutions.
Tags
- Svelte: CSS encapsulation
- Svelte: how to affect child component styles
- missing out on the benefits of something
- important point
- arbitrary limitations leading to less-than-ideal workarounds
- key point
- trying to prevent one bad thing leading to people doing/choosing an even worse option
- +0.9
Annotators
URL
-
-
hiddedevries.nl hiddedevries.nl
-
This property makes the element so that it no longer seems to exist.
-
-
svelte.dev svelte.dev
-
Reactive statements run immediately before the component updates, whenever the values that they depend on have changed.
Tags
Annotators
URL
-
-
github.com github.com
- Aug 2020
-
Local file Local file
-
www.washingtonpost.com www.washingtonpost.com
-
Bhattarai, A. (n.d.). Grocery workers say morale is at an all-time low: ‘They don’t even treat us like humans anymore’. Washington Post. Retrieved 14 August 2020, from https://www.washingtonpost.com/business/2020/08/12/grocery-workers-coronavirus/
-
-
svelte.dev svelte.dev
-
Now, when the user interacts with the keypad, the value of pin in the parent component is immediately updated.
bind a value to a prop
Tags
Annotators
URL
-
- Jul 2020
-
www.iubenda.com www.iubenda.com
-
Who needs a cookie consent banner? Any site or app running non-exempt cookies or scripts that could either:
-
have EU based users (i.e any website running cookies that isn’t actively blocking EU based users);
-
-
dmitripavlutin.com dmitripavlutin.com
-
Even so, the inline function is still created on every render, useCallback() just skips it.
-
-
www.bio-rad.com www.bio-rad.com
-
There is a simple mathematical relationship between the fraction of droplets that are unoccupied (black bar) and the concentration of target molecules.
-
Some droplets are lost in transfer steps and others are eliminated by the stringent metrics applied by QuantaSoft Software as the droplets pass through the Droplet Reader, resulting ultimately in data from 12,000–16,000 droplets being used in subsequent concentration calculations
-
-
www.sos.ca.gov www.sos.ca.gov
-
prevent its disclosure to any person not authorized to create the subscriber's digital signature
So the signature can be used by another entity to create the digital signature if authorized beforehand.
So if there is a statement that "I authorize [organization] to create a cryptographic key-pair on my behalf, and create the digital signature."
-
-
eprint.iacr.org eprint.iacr.org431.pdf1
-
compressed public keypk2={bi t,(t1,t2,t3)∈(Z2e2)3,A∈Fp2,ent_bi t,r∈Z256}
Tags
Annotators
URL
-
-
journals.sagepub.com journals.sagepub.com
-
Partitioning the sample into small containers results in a statistical distribu-tion of targets
-
purifying the target of interest from interfering compounds.
-
- Jun 2020
-
psyarxiv.com psyarxiv.com
-
Im, H., & Chen, C. (2020). Social Distancing Around the Globe: Cultural Correlates of Reduced Mobility [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/b2s37
-
-
-
COVID-19 is a threat to waste pickers. Here’s how to help them. (n.d.). World Economic Forum. Retrieved June 29, 2020, from https://www.weforum.org/agenda/2020/06/covid19-is-a-threat-to-waste-pickers-heres-how-to-help-them/
-
-
www.quora.com www.quora.com
-
The bug won’t be fixed today…and by next week, I’ll have forgotten about it - but some time in the future, before our software “goes gold” and gets shipped out to the public - we’ll search through the entire million lines of software for the word “FIXME” - which is unlikely to appear in any other context BECAUSE it’s not a real word!
BECAUSE it’s not a real word
-
-
eprint.iacr.org eprint.iacr.org243.pdf1
-
The necessity ofskRbeing secure for sender authentication is due to HPKEbeing vulnerable to key-compromise impersonation.
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.
-
-
Local file Local file
-
inhibiting both full-length AR andAR splice variants lacking LBD.
inhibit both FL and ARv7
-
- May 2020
-
github.com github.com
-
export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client"
-
if [ -z "${DOCKER_HOST:-}" ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
-
-
github.com github.com
-
if [ -n "${DOCKER_HOST:-}" ] && _should_tls; then export DOCKER_TLS_VERIFY=1 export DOCKER_CERT_PATH="$DOCKER_TLS_CERTDIR/client" fi
-
if [ -z "${DOCKER_HOST:-}" ] && [ ! -S /var/run/docker.sock ]; then if _should_tls || [ -n "${DOCKER_TLS_VERIFY:-}" ]; then export DOCKER_HOST='tcp://docker:2376' else export DOCKER_HOST='tcp://docker:2375' fi fi
-
-
www.theguardian.com www.theguardian.com
-
Kale, S. (2020, May 26). “People were like animals!” How supermarket staff watched the coronavirus crisis unfold. The Guardian. https://www.theguardian.com/lifeandstyle/2020/may/26/people-were-like-animals-how-supermarket-staff-watched-coronavirus-crisis-unfold
-
-
nvlpubs.nist.gov nvlpubs.nist.gov
-
(Thus, for these curves, the cofactor is always h = 1.)
This means there is no need to check if the point is in the correct subgroup.
-
-
en.wikipedia.org en.wikipedia.org
-
It may be the case that several sufficient conditions, when taken together, constitute a single necessary condition (i.e., individually sufficient and jointly necessary)
-
-
kantarainitiative.org kantarainitiative.org
-
Its purpose is to decrease the reliance on privacy policies and enhance the ability for people to share and control personal information.
-
-
www.iubenda.com www.iubenda.com
-
It’s useful to remember that under GDPR regulations consent is not the ONLY reason that an organization can process user data; it is only one of the “Lawful Bases”, therefore companies can apply other lawful (within the scope of GDPR) bases for data processing activity. However, there will always be data processing activities where consent is the only or best option.
-
-
-
I believe that beginning to distribute tools that patch Firefox and give back power to users and allow them to install unsigned extensions is necessary when an organization is taking away our rights without giving us a compelling reason for doing so.
-
I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
-
-
projects.invisionapp.com projects.invisionapp.comInVision1
-
The fact that you can use single character keys without modifiers to invoke functions such as Comment Mode (C) is an example of a violation of a violation of the WCAG 2.1 Success Criterion, 2.1.4 Character Key Shortcuts.
-
- Apr 2020
-
en.wikipedia.org en.wikipedia.org
-
Thus isomorphic structures cannot be distinguished from the point of view of structure only, and may be identified.
-
-
www.techopedia.com www.techopedia.com
-
A language that features polymorphism allows developers to program in the general rather than program in the specific. $(document).ready(function() { recordAdModuleData(2964, "impressions","Dictionary Ad"); });
-
-
haveibeenpwned.com haveibeenpwned.com
-
Password reuse is normal. It's extremely risky, but it's so common because it's easy and people aren't aware of the potential impact.
-
-
www.troyhunt.com www.troyhunt.com
-
So there's a lot of stuff getting hacked and a lot of credentials floating around the place, but then what? I mean what do evil-minded people do with all those email addresses and passwords? Among other things, they attempt to break into accounts on totally unrelated websites
-
-
queue.acm.org queue.acm.org
-
Want to keep your users? Just make it easy for them to leave.
-
-
kokociel.blogspot.com kokociel.blogspot.com
-
Our eyes decide our focus of attention and therefore our thoughts and our cognitive load.
-
- Mar 2020
-
tools.ietf.org tools.ietf.org
-
Designers using these curves should be aware that for each public key, there are several publicly computable public keys that are equivalent to it, i.e., they produce the same shared secrets. Thus using a public key as an identifier and knowledge of a shared secret as proof of ownership (without including the public keys in the key derivation) might lead to subtle vulnerabilities.
-
Protocol designers using Diffie-Hellman over the curves defined in this document must not assume "contributory behaviour". Specially, contributory behaviour means that both parties' private keys contribute to the resulting shared key. Since curve25519 and curve448 have cofactors of 8 and 4 (respectively), an input point of small order will eliminate any contribution from the other party's private key. This situation can be detected by checking for the all- zero output, which implementations MAY do, as specified in Section 6. However, a large number of existing implementations do not do this.
-
The check for the all-zero value results from the fact that the X25519 function produces that value if it operates on an input corresponding to a point with small order, where the order divides the cofactor of the curve (see Section 7).
-
Both MAY check, without leaking extra information about the value of K, whether K is the all-zero value and abort if so (see below).
Tags
Annotators
URL
-
-
nvlpubs.nist.gov nvlpubs.nist.gov
-
n
n is the order of the subgroup and n is prime
-
an ECC key-establishment scheme requires the use of public keys that are affine elliptic-curve points chosen from a specific cyclic subgroup with prime order n
n is the order of the subgroup and n is prime
-
5.6.2.3.3ECC Full Public-Key Validation Routine
-
The recipient performs a successful full public-key validation of the received public key (see Sections 5.6.2.3.1for FFCdomain parameters andSection5.6.2.3.3for ECCdomain parameters).
-
Assurance of public-key validity –assurance that the public key of the other party (i.e., the claimed owner of the public key) has the (unique) correct representation for a non-identity element of the correct cryptographic subgroup, as determined by the
-
-
prosecco.gforge.inria.fr prosecco.gforge.inria.fr
-
outside the subgroup
-
-
nvlpubs.nist.gov nvlpubs.nist.gov
-
5.6.2.3.2ECC Full Public-Key Validation Routine
-
The recipient performs a successful full public-key validation of the received public key (see Sections 5.6.2.3.1 and 5.6.2.3.2).
-
Assurance of public-key validity – assurance that the public key of the other party (i.e., the claimed owner of the public key) has the (unique) correct representation for a non-identity element of the correct cryptographic subgroup, as determined by the domain parameters (see Sections 5.6.2.2.1 and 5.6.2.2.2). This assurance is required for both static and ephemeral public keys.
-
-
noiseprotocol.org noiseprotocol.org
-
Misusing public keys as secrets: It might be tempting to use a pattern with a pre-message public key and assume that a successful handshake implies the other party's knowledge of the public key. Unfortunately, this is not the case, since setting public keys to invalid values might cause predictable DH output. For example, a Noise_NK_25519 initiator might send an invalid ephemeral public key to cause a known DH output of all zeros, despite not knowing the responder's static public key. If the parties want to authenticate with a shared secret, it should be used as a PSK.
-
Channel binding: Depending on the DH functions, it might be possible for a malicious party to engage in multiple sessions that derive the same shared secret key by setting public keys to invalid values that cause predictable DH output (as in the previous bullet). It might also be possible to set public keys to equivalent values that cause the same DH output for different inputs. This is why a higher-level protocol should use the handshake hash (h) for a unique channel binding, instead of ck, as explained in Section 11.2.
-
The public_key either encodes some value which is a generator in a large prime-order group (which value may have multiple equivalent encodings), or is an invalid value. Implementations must handle invalid public keys either by returning some output which is purely a function of the public key and does not depend on the private key, or by signaling an error to the caller. The DH function may define more specific rules for handling invalid values.
Tags
Annotators
URL
-
-
hal.inria.fr hal.inria.fr
-
WireGuard excludes zero Diffie-Hellman shared secrets to avoid points of small order, while Noiserecommends not to perform this check
Tags
Annotators
URL
-
-
moderncrypto.org moderncrypto.org
-
This check strikes a delicate balance: It checks Y sufficiently to prevent forgery of a (Y, Y^x) pair without knowledge of X, but the rejected values for X are unlikely to be hit by an attacker flipping ciphertext bits in the least-significant portion of X. Stricter checking could easily *WEAKEN* security, e.g. the NIST-mandated subgroup check would provide an oracle on whether a tampered X was square or nonsquare.
-
X25519 is very close to this ideal, with the exception that public keys have easily-computed equivalent values. (Preventing equivalent values would require a different and more costly check. Instead, protocols should "bind" the exact public keys by MAC'ing them or hashing them into the session key.)
-
Curve25519 key generation uses scalar multiplication with a private key "clamped" so that it will always produce a valid public key, regardless of RNG behavior.
-
* Valid points have equivalent "invalid" representations, due to the cofactor, masking of the high bit, and (in a few cases) unreduced coordinates.
-
With all the talk of "validation", the reader of JP's essay is likely to think this check is equivalent to "full validation" (e.g. [SP80056A]), where only valid public keys are accepted (i.e. public keys which uniquely encode a generator of the correct subgroup).
-
(1) The proposed check has the goal of blacklisting a few input values. It's nowhere near full validation, does not match existing standards for ECDH input validation, and is not even applied to the input.
-
-
research.kudelskisecurity.com research.kudelskisecurity.com
-
If Alice generates all-zero prekeys and identity key, and pushes them to the Signal’s servers, then all the peers who initiate a new session with Alice will encrypt their first message with the same key, derived from all-zero shared secrets—essentially, the first message will be in the clear for an eavesdropper.
-
arguing that a zero check “adds complexity (const-time code, error-handling, and implementation variance), and is not needed in good protocols.”
-
-
ico.org.uk ico.org.uk
-
While we recognise that analytics can provide you with useful information, they are not part of the functionality that the user requests when they use your online service – for example, if you didn’t have analytics running, the user could still be able to access your service. This is why analytics cookies aren’t strictly necessary and so require consent.
-
PECR always requires consent for non-essential cookies, such as those used for the purposes of marketing and advertising. Legitimate interests cannot be relied upon for these cookies.
-
-
techcrunch.com techcrunch.com
-
This means genuinely asking for permission — using honesty to win trust by enabling rather than disabling user agency.
-
-
techcrunch.com techcrunch.com
-
“meet the minimal requirements that we set based on European law” — which they define as being “if it has no optional boxes pre-ticked, if rejection is as easy as acceptance, and if consent is explicit.”
-
All of which means — per EU law — it should be equally easy for website visitors to choose not to be tracked as to agree to their personal data being processed.
-
Consent to tracking must also be obtained prior to a digital service dropping or accessing a cookie; only service-essential cookies can be deployed without asking first.
-
When consent is being relied upon as the legal basis for processing web users’ personal data
-
- Dec 2019
-
unixwiz.net unixwiz.net
-
One of the more clever aspects of the agent is how it can verify a user's identity (or more precisely, possession of a private key) without revealing that private key to anybody.
-
- Nov 2019
-
stackoverflow.com stackoverflow.com
-
const setRefs = useRef(new Map()).current; const { children } = props; return ( <div> {React.Children.map(children, child => { return React.cloneElement(child, { // v not innerRef ref: node => { console.log('imHere'); return !node ? setRefs.delete(child.key) : setRefs.set(child.key, node)
Illustrates the importance of having unique keys when iterating over children, since that allows them to be used as unique keys in a Map.
-
-
-
Each time the ID changes, the EmailInput will be recreated and its state will be reset to the latest defaultEmail value. (Click here to see a demo of this pattern.) With this approach, you don’t have to add key to every input. It might make more sense to put a key on the whole form instead. Every time the key changes, all components within the form will be recreated with a freshly initialized state. In most cases, this is the best way to handle state that needs to be reset.
-
-
github.com github.com
-
ometer.com ometer.com
-
The thing is that each UI decision depends on countless other UI decisions. A simple example is keybindings. On UNIX/Linux, it’s nearly impossible to pick reasonable default bindings for global desktop navigation because they all conflict with bindings that some app is using. On Windows, the desktop navigation bindings are hardcoded, and no app uses them, because apps know for sure which bindings to avoid.
-
-
www-nature-com.ezproxy.rice.edu www-nature-com.ezproxy.rice.edu
-
key challenge is to quantify the functional roles of bacterial taxa in nature to understand how the properties of ecosystems change over time or under different environmental conditions
-
- Oct 2019
-
github.com github.com
-
However, if more control is needed, you can pass any of these pieces of state as a prop (as indicated above) and that state becomes controlled. As soon as this.props[statePropKey] !== undefined, internally, downshift will determine its state based on your prop's value rather than its own internal state.
-
refKey: if you're rendering a composite component, that component will need to accept a prop which it forwards to the root DOM element. Commonly, folks call this innerRef. So you'd call: getRootProps({refKey: 'innerRef'}) and your composite component would forward like: <div ref={props.innerRef} />
-
- Aug 2019
-
onlinelibrary.wiley.com onlinelibrary.wiley.com
-
some of the key questions of microbial community assembly, maintenance and function could be answered by intensively studying one (or a few) synthetic model community
-
-
impedagogy.com impedagogy.comDear J…1
-
I think that if we had this tool in Blackboard we might reach a tipping point among faculty users so that Hypothes.is would bleed back out into folk’s everyday browser use and from there back into the classroom. And from there into the communities we live and share within.
You've probably hit on our most secret desire here. That we could have this kind of cross-cutting impact.
Tags
Annotators
URL
-
- May 2019
-
-
Sakaki's EFI Install Guide/Configuring Secure Boot
-