I am appalled!
All humans must adapt to the consent plans of this small standards group!
I for one do not plan to adapt - sorry about that!
Peace ..tom jones
On Thu, Dec 26, 2024 at 4:15 PM David Waite
wrote:
>
>
> > On Dec 26, 2024, at 10:38 AM, Tom Jones
> wrote:
> >
So - what trust infrastructure "needs to exist". That's a real question
that deserves a real answer. Not clear who has the smarts and authority to
do that.
Peace ..tom jones
On Thu, Dec 26, 2024 at 10:08 AM Pierce Gorman
wrote:
> What mechanism(s) are you referring to that
This problem was clearly demonstrated by the California mDL hackathon where
the default presentation was ALL DATA. That is the easiest path, so it
remains the one most taken. We have known since standards were first
introduced that they immediately create a drive to the bottom. This will be
the fat
binding to the holder.
That would be a good thing - but the only way I know involves trusting the
telco - which we all know is a dead end.
What other mechanism can bind the holder to the device w/o the telco (or do
we just nationalize the telcos again.)
Peace ..tom jones
On Tue, Dec 24, 2024 at
if by ID you mean ID number - then it is a tracking number.
Isn't it super obvious - why are we pretending to be privacy enabling?
Peace ..tom jones
On Tue, Dec 24, 2024 at 10:15 AM Wayne Chang wrote:
> Tom, how do you feel about private sector issued ID?
>
> Best,
> Wayn
don't release the ID number.
Peace ..tom jones
On Tue, Dec 24, 2024 at 6:34 AM Watson Ladd wrote:
> I see that people are uncomfortable with making any mandates, and so I've
> tried to be purely descriptive in this proposal. I leave it to the WG to
> decide where to put it, but
in OID4VP. In that case the
selective disclosure will be irrelevant as the means to disclose the
selection will be inadequate. So the SD-JWT may well technically work, but
the first use will be fraudulent as the selection will not be by informed
user consent.
Peace ..tom jones
On Tue, Dec 17, 2
> for one purpose to the police for another? This would legally not work
>
>
>
> *Von:* Tom Jones
> *Gesendet:* Dienstag, 17. Dezember 2024 02:26
> *An:* Pierce Gorman
> *Cc:* pe...@acm.org; IETF oauth WG
> *Betreff:* [OAUTH-WG] Re: SD-JWT linkability
>
>
>
&
not
be used for other purposes without the person's consent.
Clearly information holders can do what they want with their own data.
Peace ..tom jones
On Mon, Dec 16, 2024 at 11:22 AM Pierce Gorman
wrote:
> I think I disagree. I assume an SD-JWT in a VP could be volunteered by a
admirable, but
there are no UX people involved in the discussion.
Peace ..tom jones
On Wed, Dec 11, 2024 at 5:01 PM Watson Ladd wrote:
> Dear all,
>
> I'd like to propose the following edit to resolve the concerns I have
> around endorsing dangerous applications of SD-JWT:
&g
I worry about fingerprinting as well and would like to see it called out
specifically.
thx ..Tom (mobile)
On Wed, Nov 20, 2024, 9:14 AM Alex Russell wrote:
> Is there additional fingerprinting risk here? I'm happy to see this move
> forward even if there is, but we should call it out.
>
> On Tu
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=f132be9bac5f29e844e8dde4f3a70f4c3c158221
commit f132be9bac5f29e844e8dde4f3a70f4c3c158221
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:31:58 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:31
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=f132be9bac5f29e844e8dde4f3a70f4c3c158221
commit f132be9bac5f29e844e8dde4f3a70f4c3c158221
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:31:58 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:31
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=cb21fa3d0d2640a6f48a21c406cac9dd07681052
commit cb21fa3d0d2640a6f48a21c406cac9dd07681052
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:22:51 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:22
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=cb21fa3d0d2640a6f48a21c406cac9dd07681052
commit cb21fa3d0d2640a6f48a21c406cac9dd07681052
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:22:51 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:22
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=ef18594985c0d569650b44b0ba0171a6fd8703a5
commit ef18594985c0d569650b44b0ba0171a6fd8703a5
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:21:06 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:21
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=ef18594985c0d569650b44b0ba0171a6fd8703a5
commit ef18594985c0d569650b44b0ba0171a6fd8703a5
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:21:06 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:21
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=b6c90b909905a48c6f8ad027ff259e64d5d0e762
commit b6c90b909905a48c6f8ad027ff259e64d5d0e762
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:17:34 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:18
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=b6c90b909905a48c6f8ad027ff259e64d5d0e762
commit b6c90b909905a48c6f8ad027ff259e64d5d0e762
Author: Damjan Jovanovic
AuthorDate: 2024-12-06 09:17:34 +
Commit: Tom Jones
CommitDate: 2024-12-06 09:18
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=61bf830cbb260c2a046cb44421d319184393e028
commit 61bf830cbb260c2a046cb44421d319184393e028
Author: Damjan Jovanovic
AuthorDate: 2024-12-05 16:19:13 +
Commit: Tom Jones
CommitDate: 2024-12-05 16:19
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=61bf830cbb260c2a046cb44421d319184393e028
commit 61bf830cbb260c2a046cb44421d319184393e028
Author: Damjan Jovanovic
AuthorDate: 2024-12-05 16:19:13 +
Commit: Tom Jones
CommitDate: 2024-12-05 16:19
Hi hackers,
I have written a 10th Network status report, you can find it here:
https://adventurist.me/posts/00337
And all previous posts are collected at this url:
https://adventurist.me/tag/networkstatus
One thing we would like to know is how people are coming across these reports.
Is it from
Hi hackers,
I have written a 10th Network status report, you can find it here:
https://adventurist.me/posts/00337
And all previous posts are collected at this url:
https://adventurist.me/tag/networkstatus
One thing we would like to know is how people are coming across these reports.
Is it from
Hi,
I have written a 7th Network Status Report, which you can find here:
https://adventurist.me/posts/00333
All prior reports are here:
https://adventurist.me/tag/networkstatus
https://adventurist.me/fbsd-networkstatus.xml
Please let me know by email if you find any of the typos I have hidden
t
Hi,
I have written a 7th Network Status Report, which you can find here:
https://adventurist.me/posts/00333
All prior reports are here:
https://adventurist.me/tag/networkstatus
https://adventurist.me/fbsd-networkstatus.xml
Please let me know by email if you find any of the typos I have hidden
t
Hi folks,
For the past three weeks on a Friday I have been writing some commentary
on what has been happening in the FreeBSD Network Stack. The commentary
is primarily based on main branch commits, but also includes some other
stuff from the community I gather via mailing lists, phab reviews and
b
Hi folks,
For the past three weeks on a Friday I have been writing some commentary
on what has been happening in the FreeBSD Network Stack. The commentary
is primarily based on main branch commits, but also includes some other
stuff from the community I gather via mailing lists, phab reviews and
b
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=99adbd1b3f3b2c198a8994c9681655978a7d9a1f
commit 99adbd1b3f3b2c198a8994c9681655978a7d9a1f
Author: Tom Jones
AuthorDate: 2024-09-26 09:13:41 +
Commit: Tom Jones
CommitDate: 2024-09-26 09:16:17
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=99adbd1b3f3b2c198a8994c9681655978a7d9a1f
commit 99adbd1b3f3b2c198a8994c9681655978a7d9a1f
Author: Tom Jones
AuthorDate: 2024-09-26 09:13:41 +
Commit: Tom Jones
CommitDate: 2024-09-26 09:16:17
that doesn't answer the question about users randomly selecting some to
store and some to reject. This seems to me like user private information.
As is most of the feedback to the issuer from the wallet.
Peace ..tom jones
On Sat, Sep 21, 2024 at 7:30 AM Daniel Fett wrote:
> Hi Dick,
&
As I tried to make clear in an earlier post - there is no such thing as a
TLS cert. Various attributes MUST be included in TLS certs and that
combination is well known and easy to request.
thx ..Tom (mobile)
On Wed, Sep 18, 2024, 12:44 PM Michael Jones
wrote:
> Hi Richard,
>
>
>
> We clearly ha
es of the PKI for the actual purpose of the
key and cert.
Peace ..tom jones
On Tue, Sep 17, 2024 at 1:01 PM Vladimir Dzhuvinov
wrote:
> I frankly don't see how the central premise of PIKA - the reliance on a
> TLS web domain certificate - can be made to work in practice.
>
>
>
now.
Peace ..tom jones
On Mon, Sep 16, 2024 at 12:56 PM Michael Jones
wrote:
> I regret to have to report that the issues that I believe resulted in the
> first call for adoption failing, despite being discussed on-list and at
> IETF 120, have not been addressed in the specification
>
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=855c3dacfc6a1565a75086e64a154dece3ccf5fa
commit 855c3dacfc6a1565a75086e64a154dece3ccf5fa
Author: Tom Jones
AuthorDate: 2024-09-16 14:43:31 +
Commit: Tom Jones
CommitDate: 2024-09-16 14:45:26
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=855c3dacfc6a1565a75086e64a154dece3ccf5fa
commit 855c3dacfc6a1565a75086e64a154dece3ccf5fa
Author: Tom Jones
AuthorDate: 2024-09-16 14:43:31 +
Commit: Tom Jones
CommitDate: 2024-09-16 14:45:26
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=40d0f179a8a9900ccfe37a04495aee783387809b
commit 40d0f179a8a9900ccfe37a04495aee783387809b
Author: Tom Jones
AuthorDate: 2024-09-13 08:18:55 +
Commit: Tom Jones
CommitDate: 2024-09-13 08:18:55
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=40d0f179a8a9900ccfe37a04495aee783387809b
commit 40d0f179a8a9900ccfe37a04495aee783387809b
Author: Tom Jones
AuthorDate: 2024-09-13 08:18:55 +
Commit: Tom Jones
CommitDate: 2024-09-13 08:18:55
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=be9fefafc2801ef449a0f3205c9397ba35425323
commit be9fefafc2801ef449a0f3205c9397ba35425323
Author: Tom Jones
AuthorDate: 2024-09-11 12:51:10 +
Commit: Tom Jones
CommitDate: 2024-09-13 08:15:19
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=be9fefafc2801ef449a0f3205c9397ba35425323
commit be9fefafc2801ef449a0f3205c9397ba35425323
Author: Tom Jones
AuthorDate: 2024-09-11 12:51:10 +
Commit: Tom Jones
CommitDate: 2024-09-13 08:15:19
yes there is a misunderstanding - i got the idea that the website's api
could ask for the AI model it wanted - that would be a disaster.
What does the website's API specifical have access to?
I was about to ask the W3C security guy to take a look at this.
Peace ..tom jones
On Thu, Se
they found one that would give access to my stuff. This is nuts. Please
stop it now.
Peace ..tom jones
On Thu, Aug 22, 2024 at 5:05 PM Domenic Denicola
wrote:
>
>
> On Fri, Aug 23, 2024 at 2:45 AM Tom Jones
> wrote:
>
>> It seems to me that the security and privacy r
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=e1b1984abb8b673d43082660a5ae740741f85df6
commit e1b1984abb8b673d43082660a5ae740741f85df6
Author: Tom Jones
AuthorDate: 2024-09-06 13:06:57 +
Commit: Tom Jones
CommitDate: 2024-09-06 13:09:12
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=e1b1984abb8b673d43082660a5ae740741f85df6
commit e1b1984abb8b673d43082660a5ae740741f85df6
Author: Tom Jones
AuthorDate: 2024-09-06 13:06:57 +
Commit: Tom Jones
CommitDate: 2024-09-06 13:09:12
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=390dc369efaaeca2802baf168ddbd7a40e3afcc8
commit 390dc369efaaeca2802baf168ddbd7a40e3afcc8
Author: Tom Jones
AuthorDate: 2024-09-06 11:59:09 +
Commit: Tom Jones
CommitDate: 2024-09-06 12:48:04
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=390dc369efaaeca2802baf168ddbd7a40e3afcc8
commit 390dc369efaaeca2802baf168ddbd7a40e3afcc8
Author: Tom Jones
AuthorDate: 2024-09-06 11:59:09 +
Commit: Tom Jones
CommitDate: 2024-09-06 12:48:04
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=d8fffc3704a0d7f4ea5b866f689e58480ddebaa1
commit d8fffc3704a0d7f4ea5b866f689e58480ddebaa1
Author: Tom Jones
AuthorDate: 2024-09-04 15:32:56 +
Commit: Tom Jones
CommitDate: 2024-09-05 13:51:37
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=d8fffc3704a0d7f4ea5b866f689e58480ddebaa1
commit d8fffc3704a0d7f4ea5b866f689e58480ddebaa1
Author: Tom Jones
AuthorDate: 2024-09-04 15:32:56 +
Commit: Tom Jones
CommitDate: 2024-09-05 13:51:37
Can you create a bug to track this and assign it to me (thj@) ?
I see the same error with a chv32 programmer, but as a regression it is more
important to track down than new hardware being weird.
On Mon, Aug 19, 2024, at 19:23, Axel Rau wrote:
> Hi,
>
> Once a year, I flash some ATtinys.
> For
It seems to me that the security and privacy risks in this proposal are
gigantic. Cross site scripting attacks have been difficult to block and
now the suggestion is to allow some AI, which may change from day to day to
insert attacks.
Peace ..tom jones
On Wed, Aug 21, 2024 at 11:28 PM Domenic
I completely agree that education of users is not an answer to any security
question.
Be the change you want to see in the world ..tom
On Thu, Aug 22, 2024 at 10:08 AM Watson Ladd wrote:
> Hello,
>
> I would like to point out that the issuer verifier problem still
> remains open, even given th
Hi Folks,
Thanks to help from jrm@ since the end of last week VPP is now available as a
FreeBSD port.
https://cgit.freebsd.org/ports/commit/?id=8ac9dd794c8fafcd763dc541c13790bcc23699b3
The port is based on VPP 2024.06 with some minor changes to enable DPDK on
FreeBSD.
>From a FreeBSD system i
There are many cases of verifiers colliding with issuers.
Police recording all traffic stops looking for patters of abuse.
One time time and similar use restrictions on tokens.
Patterns of use that indicate fraud or abuse of financial or tracking by
third parties.
Password or vendor relations apps.
Why aren't we talking about going to DANE instead?
thx ..Tom (mobile)
On Thu, Jul 25, 2024, 3:34 PM Matthew McPherrin wrote:
> My primary concern with "moving beyond the CSR" is that it's a defacto
> standard which is widely supported today, so we should make sure that (at
> least for the most
I have opposed channel-binding or token-binding from the beginning as they
serve very different puppies and typically fall under different management
within large enterprises. I have tried to push for a simple way to test the
validity of a signature for decades into the future as that is typical fo
I am utterly appalled by this statement
" opaque value, OAuth implementors usually don't sanitize the value."
No web site should ever use any data from the user's device without full
validation as it is *completely untrustworthy*.
Treating this head value differently than any other header value is
>
>>>>> TLS is not removed, we use X.509 based pki on the web, therefore also
>>>>> using federation.
>>>>>
>>>>> TLS is used to establish confidentiality with an endpoint,
>>>>> establishing trust to a subject only because it c
This whole problem did not need to happen. When the federation spec was
being created I asked them not to deviate unnecessarily from pki. But the
very guys that are on this thread told me that they were not a pki and so
there was no reason for them to follow existing rules. This is entirely a
probl
Question - how does all this interact with the password manager?
Can the RP ask if they have an entry in the PM first? Or is that too much
of a privacy issue?
Also when calling for an app, wouldn't it matter if the app were web vs
native?
Which one does this thread discuss? ..tom
On Tue, May 21,
/1n7HobJ6QTsNld5rn1uuIiNw0A__L44ug/edit?usp=sharing&ouid=109794657323597753486&rtpof=true&sd=true
..tom
On Thu, May 9, 2024 at 10:01 AM Sam Goto wrote:
>
>
> On Thu, May 9, 2024 at 9:07 AM Tom Jones
> wrote:
>
>> Has anyone considered what information the RP verif
Has anyone considered what information the RP verifier should supply for
FedCM to function well on the behalf of both the verifier and the user?
thx ..Tom (mobile)
On Thu, May 9, 2024, 8:06 AM Dick Hardt wrote:
> The NASCAR problem is rooted in the RP does not know which provider(s) the
> user
Right. Google treats email as a guid for user name. Any old guid should
work.
thx ..Tom (mobile)
On Sat, May 11, 2024, 3:22 PM Dick Hardt wrote:
>
>
> On Wed, May 8, 2024 at 4:07 PM Sam Goto
> wrote:
>
>> That's easier to answer: the browser needs name/email/picture to
>> construct an account
Y'all are missing another option. (re Sam's Comments)
The user is given a user agent to use on their own device when accessing
enterprise data.
I know of two that are shipping today. https://www.getprimary.com/
Now it is possible to access other sites with these browsers as well - in
fact they spec
>> on testing this out the biggest gap I see is that we need a documentation
>> update for it. In V3 can you please update the FreeBSD GSG doc with some
>> details about how to use this feature.
>>
>> Also, on first run using testpmd, the application failed to start, as I was
>> missing a file
you think is best.
Sorry for the patch confusion, I'll try to keep the sequence obvious going
forward.
Tom
On Fri, May 3, 2024, at 14:03, Bruce Richardson wrote:
> On Fri, May 03, 2024 at 09:46:15AM +, Tom Jones wrote:
>> Add support to the contigmem module on FreeBSD for mul
Add support to the contigmem module on FreeBSD for multiple concurrent
files, this enables running multiple dpdk instances with the nic_uio
driver.
Add relevant parts in dpdk to support this.
Signed-off-by: Tom Jones
---
config/rte_config.h | 2 +
kernel/freebsd/contigmem
Add support to the contigmem module on FreeBSD for multiple concurrent
files, this enables running multiple dpdk instances with the nic_uio
driver.
Add relevant parts in dpdk to support this.
Signed-off-by: Tom Jones
---
config/rte_config.h | 2 +
kernel/freebsd/contigmem
Can you isolate out the extraneous stuff and loop tx and rx on a CP2101 board
and send bytes through?
I did a bunch of development on an esp8266 board in the last few weeks and had
no issues, but I’ve no idea if it were the same usb serial chip.
I’ll have a dig around and see if I have someth
available, and the rework was more than I could handle.
So, if you have any suggestions, that would be great.
Thanks,
Tom Jones
___
Address messages to ev@lists.evdl.org
No other addresses in TO and CC fields
HELP: http://www.evdl.org/help/
There is a huge demand for protecting data that's shared with users Any
help in strong binding data to origin and blocking sharing would a big win.
thx ..Tom (mobile)
On Mon, Apr 8, 2024, 1:20 AM Yoav Weiss (@Shopify)
wrote:
> This is very interesting!
>
> Do I understand correctly and the mai
There is a huge hole here. Revocation of (for example) driving privileges
should not impact the use of the cred for other purposes. The revocation
idea can lead to cancelation of the person. Some that violates the
fundamental rights of human beings. Revocation is basically discrimination.
thx ..To
So now we are proposing types of types of types of data elements. I feel
really bad about this as I introduced the first semantic tag into EDI back
in the 1980s. I can't believe it has come to this. I can't believe that
anyone imagines giving this sort of specification to different programmers
and
On Tue, Mar 26, 2024, at 18:31, Benoit Chesneau wrote:
> How does work VNET with interfaces? Is this as efficient as using pci
> passtrough in a vm ?
Overhead should be minimal, while the device is logically missing from the
default vnet there isn't any more "in the way" for actual usage. Ma
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=73fdbfb911215795c55c89870ebc5d9197bf2a23
commit 73fdbfb911215795c55c89870ebc5d9197bf2a23
Author: Tom Jones
AuthorDate: 2024-03-26 09:52:07 +
Commit: Tom Jones
CommitDate: 2024-03-26 09:55:55
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=73fdbfb911215795c55c89870ebc5d9197bf2a23
commit 73fdbfb911215795c55c89870ebc5d9197bf2a23
Author: Tom Jones
AuthorDate: 2024-03-26 09:52:07 +
Commit: Tom Jones
CommitDate: 2024-03-26 09:55:55
On Thu, Mar 21, 2024, at 10:15, David Marchand wrote:
> Hello Tom,
>
> On Thu, Mar 21, 2024 at 11:00 AM Tom Jones wrote:
>>
>> Commit 29a1c9107bb disabled interrupts on FreeBSD for the vmxnet3 driver
>> as they are not supported. Rx queue interrupts were missed by th
Fixes: 40d5676ff1ea ("net/vmxnet3: fix initialization on FreeBSD")
Cc: sta...@dpdk.org
Signed-off-by: Tom Jones
---
drivers/net/vmxnet3/vmxnet3_ethdev.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/net/vmxnet3/vmxnet3_ethdev.c
b/drivers/net/vmxnet3/vmxnet3_ethdev.c
i
ff-by: Tom Jones
---
drivers/net/vmxnet3/vmxnet3_ethdev.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/net/vmxnet3/vmxnet3_ethdev.c
b/drivers/net/vmxnet3/vmxnet3_ethdev.c
index 2707b25148..ce7c347254 100644
--- a/drivers/net/vmxnet3/vmxnet3_ethdev.c
+++ b/drivers/net/vm
ff-by: Tom Jones
---
drivers/net/vmxnet3/vmxnet3_ethdev.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/net/vmxnet3/vmxnet3_ethdev.c
b/drivers/net/vmxnet3/vmxnet3_ethdev.c
index 2707b25148..8b12967fa2 100644
--- a/drivers/net/vmxnet3/vmxnet3_ethdev.c
+++ b/drivers/net/vm
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9
commit 3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9
Author: Tom Jones
AuthorDate: 2024-02-23 15:58:38 +
Commit: Tom Jones
CommitDate: 2024-02-23 15:58:38
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9
commit 3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9
Author: Tom Jones
AuthorDate: 2024-02-23 15:58:38 +
Commit: Tom Jones
CommitDate: 2024-02-23 15:58:38
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=b9870ba93ea90a12f5a5727c80f7958b17f9afcc
commit b9870ba93ea90a12f5a5727c80f7958b17f9afcc
Author: Tom Jones
AuthorDate: 2023-10-06 13:19:31 +
Commit: Tom Jones
CommitDate: 2024-02-23 13:47:35
The branch main has been updated by thj:
URL:
https://cgit.FreeBSD.org/src/commit/?id=b9870ba93ea90a12f5a5727c80f7958b17f9afcc
commit b9870ba93ea90a12f5a5727c80f7958b17f9afcc
Author: Tom Jones
AuthorDate: 2023-10-06 13:19:31 +
Commit: Tom Jones
CommitDate: 2024-02-23 13:47:35
Hi freebsd-net,
I have been working for the last few months of porting VPP to FreeBSD and this
work is now ready for very early testing. This porting work is sponsored by the
FreeBSD Foundation in partnership with RG Nets.
If you would like to experiment with VPP on FreeBSD then you can work fr
Not sure if techies care, but that really needs to be a four party
transaction where the subject of a credential may not be the holder of the
device where the credential is held. Your are thereby excluding
appropriately 15% of humanity. This is, frankly, unconscionable and you
must accommodate all
I think the proposal should be renamed as optimized data mining. AIs around
the world will love the idea. Herd privacy is utter nonsense and has been
from the beginning.
On Tue, Feb 6, 2024, 5:08 AM Denis wrote:
> Comments on draft-ietf-oauth-status-list-01.txt
>
> The text states:
>
> *11.* *Pr
On Sat, Feb 3, 2024, at 20:20, Benoit Chesneau wrote:
> I there any public source repository for the development of VPP on
> FreeBSD? Any link to follow?
>
> Benoît
I’m working to upstream changes right now and plan to start a development
branch early next week.
- Tom
The whole thing is pointless as the client owner (as opposed to the subject
for which client status is requested) can just define the instances to be
the same. There can be no way to attest to the validity of such an
assertion.
thx ..Tom (mobile)
On Fri, Jan 26, 2024, 10:42 AM Justin Richer wrot
gt; required.
>
> Key binding is basically the secured version of a W3C VP, but restricted
> to a single credential, instead of multiple credentials.
>
> Key binding is not required afaik.
>
> Therefore presentation can be forwarded / reused.
>
> OS
>
> On Tue, Jan
't process VCs, their
> computers do. (Hence the terminology of User Agent, not user, in the
> W3C)
>
>
>
> On Sun, Jan 21, 2024 at 4:46 PM Tom Jones
> wrote:
> >
> > I should have added - if you get a verifiable presentation from a wallet
> with a verifi
it is far from
complete.
https://tcwiki.azurewebsites.net/index.php?title=Verifiable_Presentation#Full_Text_or_Meme
..tom
On Sun, Jan 21, 2024 at 1:03 PM Tom Jones
wrote:
> Technically oauth is about authorization not authentication. And
> technically attestation is provided by rats a
; Best
>
> Don
>
> And for the record I am not a technologist. I am a person who tries to
> solve business problems.
>
>
>
> On 2024-01-21 11:08, Tom Jones wrote:
>
> yes - i see that's what you are doing and think it is not only wrong, but
> misleading.
&g
texts. . (like
proof -> a cryptographic ability that is verifiable)
Perhaps you don't care that these are incorrect uses of the word?
..tom
On Fri, Jan 19, 2024 at 10:46 AM wrote:
> You present evidence as proof.
>
>
> On 2024-01-19 12:50, Tom Jones wrote:
>
>
> Proo
Proof seems to be yet another term for which we already have other terms.
Can anyone explain the difference between:
proof
presentation
evidence.
..tom
On Fri, Jan 19, 2024 at 4:28 AM Denis wrote:
> Hi Giuseppe,
>
> Ciao Denis,
>
> Thank you! By points.
>
> First, I still have a vocabulary pro
al carries the
> status.status_attestation object this is the element that gives to the RP
> the hint to looks in the vp_tokens for the status attestation.
>
> and they all lived happily ever after, please help me find some problem
>
>
> --
> *Da:*
The big problem is that standards bodies all over the spectrum are creating
attestations without even bothering to see what is happening in other
communities. The verifier will have many attestations to choose from and
will thus choose to do nothing with any of them. Perhaps it is time to ask
a ver
Pronounce jwt as tho it were a Welsh word. It comes out close. More like
joot
thx ..Tom (mobile)
On Thu, Jan 11, 2024, 6:53 PM RFC Errata System
wrote:
> The following errata report has been rejected for RFC7519,
> "JSON Web Token (JWT)".
>
> --
> You may re
JWT
>
> Secevents or a JWT credential might define parameterization. For example,
> a credential might describe itself as having particular types/profiles of
> claims about a subject, such as being usable as a driving license and as a
> primary government-issued identification.
>
>
I agree with Mike. This exercise seems to add confusion rather than clarity.
thx ..Tom (mobile)
On Tue, Nov 28, 2023, 10:05 AM Michael Jones
wrote:
> Orie, you wrote:
>
>
>
> TLDR; TallTed believes that the convention in the JWT BCP is not correct:
>
> https://datatracker.ietf.org/doc/html/rfc8
This sounds like an attempt to re-enable 3rd party cookies.
Are you seriously considering allowing access to a user's camera from one
client to another w/o user consent?
This is the sort of stuff that gives the web a bad name!
..tom
On Tue, Nov 14, 2023 at 10:20 AM Atul Tulshibagwale wrote:
> I
I appreciate the problems and am disappointed that the project was
abandoned.
I come from a different space, the Open Wallet Foundation, where a very
similar problem is evolving (see the IETF RATS efforts as an example). In
my view the problem is that the client should not need to trust the server
1 - 100 of 1033 matches
Mail list logo