GuestArticles index [LWN.net]https://lwn.net/Archives/GuestIndex/
API for full-memory encryption (January 18, 2019) Controlling device peer-to-peer access from user space (March 7, 2019) Bounce buffers for untrusted devices (April 26, 2019) Tell
C-Kermit Frequently Asked Questionshttps://www.kermitproject.org/ckfaq.html
authentication and encryption using the Kerberos 4, Kerberos 5, SSL/TLS, and SRP security methods. On selected platforms, other networking methods such as X.25 are also supported.
That's everything I could find.
Help make me smarter by submitting a page.