(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
# Github already dropped support for diffie-hellman-group1-sha1 and diffie-hellman-group14-sha1 | |
# FYI: https://githubengineering.com/crypto-deprecation-notice/ | |
# Host github.com | |
# KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1 | |
Host * | |
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256 | |
PasswordAuthentication no # comment this if you need password authentication (for example ssh into a VM) | |
ChallengeResponseAuthentication no | |
PubkeyAuthentication yes |
class Symbol: | |
__registry = {} | |
__lock = Lock() | |
__slots__ = ('name',) | |
def __new__(cls, name): | |
instance = cls.__registry.get(name) | |
if not instance: | |
with cls.__lock: | |
# A classical double-checked lock pattern. |
adb shell appops set com.tencent.mm OP_READ_PHONE_STATE ignore | |
adb shell appops set com.tencent.mm COARSE_LOCATION ignore | |
adb shell appops set com.tencent.mm FINE_LOCATION ignore | |
adb shell appops set com.tencent.mm RUN_IN_BACKGROUND ignore |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
.host:/vmshared /mnt/vmshared fuse.vmhgfs-fuse allow_other,uid=1000,gid=1000,auto_unmount,defaults 0 0 |
### Keybase proof | |
I hereby claim: | |
* I am quantumghost on github. | |
* I am quantumghost (https://keybase.io/quantumghost) on keybase. | |
* I have a public key whose fingerprint is C685 98CD AF85 11D1 6CB9 0610 B29A 1408 6516 184D | |
To claim this, I am signing this object: |
MesaLink是百度安全实验室开发的一个内存安全并兼容OpenSSL的传输层安全(Transport Layer Security, TLS)协议栈。近年来TLS漏洞频发,以2014年的OpenSSL"心血"为代表的内存安全漏洞对业界造成了巨大损失。MesaLink的主要目标是用Rust这样一个保证内存安全的语言,根除TLS协议栈中威胁通信安全性和完整性的内存安全漏洞,减小攻击面且保证攻击面收敛可审计。此外,MesaLink支持跨平台,提供兼容OpenSSL的C API,更可在安卓和libcurl中无缝替换OpenSSL。这极大地降低了开发成本,方便智能设备厂商快速获取安全通信的能力,从而实质性提升智能设备生态的安全性。MesaLink已经在Github上以BSD协议开源,同时MesaLink也是OASES智能终端安全生态联盟的核心开放技术之一;我们欢迎更多合作伙伴的加入,共建安全生态。
为提供完善的功能,并保证强健的安全性,MesaLink 将遵循 Rust SGX SDK 项目中提出的混合代码内存安全架构三原则:
Queue:
Database:
127.0.0.1 api.ad.xiaomi.com | |
127.0.0.1 sdkconfig.ad.xiaomi.com | |
127.0.0.1 ad.mi.com | |
127.0.0.1 ad.xiaomi.com | |
127.0.0.1 ad1.xiaomi.com | |
127.0.0.1 adv.sec.miui.com | |
127.0.0.1 test.ad.xiaomi.com | |
127.0.0.1 new.api.ad.xiaomi.com |
clowwindy设计Shadowsocks的思路分析以及设计理念
鄙人不才,尝试站在原作者clowwindy的角度,来分析一下原版协议的设计思路和理念。 没参与过最初开发,不过设计了AEAD这个协议。读了一些资料,评论。
在 7:58 PM, 31 Aug 2015
作者发了这么一段话,我很好奇其中的指代内容,遂有本文。
眼睁睁看着一群人把一个东西搞错然后朝着错误的方向走了。不过懒得管了 =。=