instruction
stringlengths
24
29.9k
WebRTC manages to leak my IP when I use proxy, but when I use VPN it only shows VPN server's IP (both proxy and VPN were system-wide). What's the key difference? Google Chrome was used in both tests (webRTC leak test). https://browserleask.com — site I used to run both tests. It also doesn't matter whether I use local ...
I wanted to try new sha3sum so I installed libdigest-sha3-perl on Debian 10. After reading man page I quickly realized that: sha3sum --algorithm 256 test.txt produces similar output to sha256sum and that sha3sum --algorithm 512 test.txt produces similar output to sha512sum. But I found two algorithms that don't really ...
I'm a bit lost as to the best practice surrounding a production-ready access management based on keycloak and open id connect. My understanding is that if you use Keycloak's provided adapters, instead of writing your own, you end up with a cookie and a session, instead of using the JWT that is provided by the Keycloak ...
Is there another method apart from using a wordlist to crack WPA/WPA2 passwords? because it's not going to work for all cases. Even using the biggest wordlist ever, there are cases where there won't be a match in the wordlist. (assuming that WPS is off too because if WPS is on, the password may be cracked through weakn...
I have installed ModSecurity in Apache server and using it as a reverse proxy to forward request to a NodeJS applicaiton. I have followed this tutorial to configure ModSecurity in Apache, https://www.atlantic.net/vps-hosting/securing-your-apache-web-server-with-mod-security/ I then enabled SecRuleEngine and set it valu...
I'm working on web scraping and data mining for Alexa top-ranked websites in the world. I was doing that with node.js, Axios (for HTTP request), on a Windows machine (especially on WSL bash). After I was running the top 500 or 1000 websites, I started getting some malicious attacks, security problem notifications from ...
I use a Yubikey in PIV/CCID mode. The PIN is sent from the host computer via automated script and unlocks the Yubikey PIV smartcard. In this mode, is it essential that the USB connection is trusted? In other words if an attacker can sniff the USB traffic can the attacker sniff the PIN and/or use the keys inside the Yub...
This may be a little unnecessary, but taking into consideration: There are many ways to hack a computer There are many ways to hack a network There is always a possibility of an undetected malware on a device You can't be by your computer 24/7, leaving time for others to (possibly) hack your hardware There is the poss...
Let’s say I use my Yubikey OTP to login to multiple servers, and it one becomes compromised. I go to login the that compromised server, and enter my OTP. Obviously, once that’s password is verified it can’t be reused, but whose to say the server has to verify it? The malware could than go on to replicate itself by atte...
I have a remote server into which I login via ssh. On this server I have setup a Wireguard VPN to which my host connects. The ssh server (ssh daemon) listens on a private IP interface (the server's Wireguard interface). It seems to me that the only way to get into my remote server (even try to) would be to have my Wire...
I know that one can see the modification, access, and creation date of a file on Windows. And that the creation date, as well as other dates, can be modified at will. I just wonder if it is possible to forensically determine who created a file? For example, is it possible to find out which DESKTOP_NAME created a .txt o...
I downloaded Windows 10 Pro (unactivated) when I first built my PC, but was given an activation key from my school's IT website after logging in. I entered the key which activated windows and now I am using Windows Education. How much (if at all) can they monitor my activity (what applications I have open, what files I...
My computer was hacked, which probably resulted in malware/a virus being installed so I'm using my most recent backup on a separate machine (all macOS). Luckily, I was able to determine the timing of the attack exactly, so I know the backup is clean and my separate machine should be good to go. But I wonder: is it safe...
On msfconsole, we can share some things across the same workspace on another instance of msfconsole -- for example, services and creds. However, I see that sessions and routes are not shared across multiple consoles on the same workspace. Is this possible? Or is it deliberately removed in the free version of Metasploit...
My goal is to obfuscate metasploit windows payloads' assembly code (adding junk code to the payload itself), then adding the obfuscated shellcode to inline assembly in C. The issue is there is no format command line argument (-f) that provides an asm option. Does anyone know how to output only the assembly code of the ...
Let's say the user has installed a python interpreter on their machine/browser, for example, using something like https://github.com/iodide-project/pyodide. I understand not allowing someone to enter in arbitrary code when they don't own the resources, for example doing something like: exec('while 1: os.fork()') Howev...
I have these group policies set on my personal computer and it seems to me they should protect against Rubber Ducky attack (however I've read other threads that say it's hard to protect against, hence I'd like to verify): 1. Block all devices: gpedit.msc -> Computer Configuration\Administrative Templates\System\Device...
This is not much of a technical but more of a practical question. Both in AWS-EC2 instance and GitHub repos I had to generate a cryptographic key pair to encrypt data sent over SSH tunnel. For AWS the public key is on the remote computer, and the private .pem key in mine. (my understanding of it). They keys are generat...
The challenge data is: AkQ2KVX5poU8LcrSpVE3xRfH3rYEYKH9pJ6HH9hipkCaVqagCyPfmiAToxHWCTNtHQ6twaEtoTPGLywKXxYYQS8E1ytgiHCepsAK2fFqRiKh23MS9f9reW7NBE8ef1VKYCSkQQ6uJ5acMAD1w298XGi1sU7UzjZfvKT8UZiSJgm83aeNBbSkyM26oLM2ZQw6PGkJnoE4i4idL5VAKDxnMC6PumppcZZA7qdwSQf3EH8bb6CHy5F7UR5ymrZFp52cERMCbR5JWC9QUvScTPzuyfkKCnYiAAatRVYLjxNCR...
I want to generate a wordlist that contains only uppercase characters on length 8 and each character appears only once. Is there any way to do that?
I sometimes want to run untrusted JavaScript, mainly for CTFs. It can be obfuscated JavaScript code or something like JSFuck. The point is, I know nothing about the code and just want to quickly see its output. Of course, I don't want the JavaScript code to affect the other open pages/tabs. We can assume no exploit is ...
I have been looking for cloud based proxies, and I notice that it's very common to authenticate to a proxy using basic auth over an unencrypted connection. I don't understand why this is considered acceptable. Is proxy authentication different than regular basic auth? Based on this article, it seems like it is not diff...
Quote from Hardware for Protecting Privacy and Security Microphone Blocker A microphone blocker is a device that prohibits audio hacking, in the form of a hardware accessory for a smartphones, laptops etc. It functions as a dummy mic jack, so the device thinks it has a microphone plugged in, and hence disables the int...
So, I have been working on my own project for which I have been looking into certificates and such. While browsing reddit I found a game which I can launch the exe file, expecting to get a Windows 10 warning message, such as occurs for most games on itch.io, and for my own unsigned applications. To my surprise however,...
Is there any pattern or characteristics to identify a kpsensor? It is one of the most used. I have noticed that of the number of supposedly open ports, only those with a real service running respond to the nmap -sV, the others can give the same services (but the response time is equal to the other false ports) or not r...
I'm running an Evil Twin attack with airgeddon. Point is that after deauth the account is going, automatically, to get reconnected to the orginal AP and not the fake one. The aireplay is likes so: aireplay-ng -0 0 -a [BSSID] wlan0 -c [TARGET MAC]
I have a Windows 10 PC that I would like to protect a little better. I've looked for solutions online, but they're all business oriented. What I would like, in an ideal situation, is having to enter my password and a Google Authenticator code (6 digits) before I can login to my PC. Is there any way I can achieve this? ...
ArchLinux wiki page on GnuPG reads Once a key has been submitted to a keyserver, it cannot be deleted from the server. Does that mean that also the expiration date with which I published the key via gpg --send-keys key-id cannot be changed?
I am a long-standing KeePass user, but I find its browser integration and Android apps a bit ropey, and certainly harder work than a cloud-based solution such as Lastpass or Bitwarden. I have been trying both of those, and they are so much more convenient, but I do worry about how vulnerable they may be to attack. I kn...
Let's say I have account A on site example.com that has a policy of strictly one account per real person. I then create a new Gmail address, use that Gmail address to open a new Chrome user (not incognito), then use that Chrome user and session to create a new account B on example.com. I know that example.com can see t...
My home router is an AVM FritzBox and it's able to log all incoming and outgoing traffic in a file format readable by Wireshark. Some days ago I started capturing all traffic for about an hour to get an understanding of what kind of traffic is leaving and entering my home network and to get more familiar with Wireshark...
It is a laptop shared by my lab. Today I use it, another day one of my student takes it on a field trip. I have 3 hard drives. I wanna leave 2 hard drives for my students and 1 for myself. On my hard drive, I have all my stuff. Students have admin access since they need to install programs, run scripts, etc. Is there a...
Lets say i have connected to a VPN server using Linux with the help of Cisco anyconnect protocol or PPTP protocol. now when i try to connect to it, it says : The certificate may be invalid or untrusted! Reason: signer not found I kinda know the owner of the server but i do not fully trust them. So if i connect to this...
I've been using someone else's VPS and connecting from my computer. I've been connecting via WinSCP and the server is hosted on OVH. Is it possible for the VPS host to have access or view the files on the connecting computer? If it is possible, what do I do to delete the files, or protect them?
Listing all the ports currently in use on my mac running $ sudo lsof -i -n -P | grep TCP, I see six entries starting with a weird-looking string of "2BUA8C4S2". A web search for that string yields some results, but no explanation of what it is. All my other ports have innocuous-looking identifiers such as "homed" and "...
I need to generate a MAC signature for data on a website, but it's in a HTML templating system where there's only a few functions available. The only hashing function available is md5. Ideally, I'd use a real hmac function, but since that's not an option here, is it secure to have something like the below? secret_key =...
My usual workflow is to run potentially malicious applications/websites (untrusted) inside of a virtualbox VM. Lately I have been playing with hyper-v. From what I gather, critical windows components are running in a VM (with Defender System Guard) and the "rest" of windows is in another VM. I then have two options: ha...
I have a single home server with a single NIC. I intend to run numerous services -- some will be internet exposed, some will not. I don't know if I am going to run them as VMs or Docker container but it shouldn't matter for this question. Say I ultimately need to open port: :1234 that'll accept traffic from the intern...
The GnuPG documentation lists an option called --export-options parameters. One of the possible parameters for this option is backup (aliased export-backup). The description for --export-options backup states: Export for use as a backup. The exported data includes all data which is needed to restore the key or keys la...
I'm evaluating a CSP policy using https://csp-evaluator.withgoogle.com/. The policy is configured as follow: default-src 'self';object-src 'self';script-src 'self' 'unsafe-inline' 'unsafe-eval';script-src-elem 'self' 'unsafe-inline' 'unsafe-eval';script-src-attr 'self' 'unsafe-inline'; Why only 'unsafe-inline' of 'scr...
Recently, I came across an issue concerning a daemon named gamecontrollerd in OsX Big Sur. On my laptop I'm running ReiKey (from Objective-See), which aims at identifying possible Key Loggers that leverage "event taps". Today I got this strange (and somehow creepy) situation: as soon as I started the Password Manager s...
I've been reading several articles recently about how storing JWTs in local or session storage is inherently insecure. The mitigation is apparently to implement a "session ID pattern", i.e. create a session ID, which is stored in a signed HttpOnly cookie and is also included in the JWT, in which case both can be compar...
I am pentesting an infotainment platform that is still under development. I did a nmap scan (for all ports with option -p-) of the platform and found a few open ports. 111/tcp open rpcbind 3490/tcp open colubris 5355/tcp open llmnr 8888/tcp open sun-answerbook 9999/tcp open abyss 16509/tcp open unknown 5133...
My work lets us log onto their WiFi with our personal phones. We don’t have to log on every time; it just connects automatically. I have nothing downloaded on my phone from my work that they could ‘spy’ on me with. Am I right in thinking if it is a secure site, for example, google.com if I search let's say for Facebook...
I left my Facebook logged in on my work computer (I help with social media and am an admin). I closed the tab without logging out and it was only when I went to go back onto Facebook again that it was already signed in. Will my manager be able to see conversations even if the tab is closed?
Part of the Snowden revelations was that the NSA had targeted IPSec. But I'm having trouble separating FUD from legitimate issues. How credible is this? Are there ways to use IPSec to be confident against it being broken? I like IPSec because it's fast and standard, so I'd like to continue using it instead of say, Open...
By changing the X-Forwarded-For header in a request, I am able to have it sent an OOB interaction with Burp Collaborator requesting a DNS lookup of type A. Is there any risk to this vulnerability or should this just be reported as an information disclosure of an internal IP?
I was reading this wikipedia article on Keysigning: https://en.wikipedia.org/wiki/Keysigning and I then came across this discussion Stack overflow about message signing with RSA: https://stackoverflow.com/questions/454048/what-is-the-difference-between-encrypting-and-signing-in-asymmetric-encryption In reading them it ...
can my school or family know what I do on my home laptop which my dad gave and also has many of his ex company's information but I logged of everything can my school still see anything
I have a single home server with a single NIC. I intend to run numerous Docker containers -- some will be internet exposed, some will not. The way I see it, I have two options: Use the normal bridge network driver: Create 2 unique bridge networks to segment the traffic: One for internet exposed Docker containers One...
I recently purchased a wifi extender and I now have to set it up. There are three options for how to set it up: Through the app By pressing the WPS button on the router and then pressing the WPS button on the extender By connecting to the wifi network of the extender (which does not have a password) and then navigatin...
I see the following output from search in msfconsole. msf6 > search CVE-2014-3566 Matching Modules ================ # Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 auxiliary/scanner/http/s...
Is it normal to get 3000+ vulnerabilities while scanning server using Nexpose? Or I can reduce the vulnerability to decent count by some tweaks!
I was thinking about zero-trust systems over the last few weeks and it seems like there are many things that could be implemented that way. With password managers being one of those things, I was curious about designing something like google sign-in as a zero-trust account/authentication system. Let's call such a syste...
Scenario I have a website secret.example.com, which contains information which must not be disclosed to third parties. In order to protect the information, TLS client authentication was chosen. Whether or not a client is authorized depends on them possessing a client certificate which is signed by the internal CA. The ...
When I do one of these payloads, I can see /etc/passwd: <iframe src=file:///etc/passwd></iframe> <img src="xasdasdasd" onerror="document.write('<iframe src=file:///etc/passwd></iframe>')"/> However this I got blind XSS, so I need to send the iframe text back to me, so I need to grub the iframe text and do something li...
I'm studying the source code of malware developed in c++ and I have two questions in the source code below This is probably code that loads malicious dlls into memory. typedef BOOL (WINAPI *VirtualFreeT)( __in LPVOID lpAddress, __in SIZE_T dwSize, __in DWORD dwFreeType ); char dllA[] = {'K','E','R','...
I have a Bluetooth earphone connects to both iPhone and android. I forgot to switch off the connection of android when using iPhone. So I am wondering if the sound of iPhone or even the iPhone data privacy could be recorded or leaked to that andriod phone when they were both connected to the same Bluetooth earphone. O...
My home network is "governed" by my ISP's router. Sometimes I saw strange packets outside my private IP range, appearing at my computers interfaces. Maybe something crossed VLANs, etc., I do not know (TV is in a separate VLAN). This pushed me to creating my own private network (also no security updates for ISP's router...
I have a python code on Linux to create a raw packet: import socket s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_TCP) s.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1) ip_header = b'\x45\x00\x00\x28' ip_header += b'\xab\xcd\x00\x00' ip_header += b'\x40\x06\xa6\xec' ip_header += b'\x0a\x0a\x0...
HTTPS relies on server certificates to ensure you are connected to the correct server and thus thwart man-in-the-middle attacks. Nowadays, there are countless certification authorities in many countries around the globe. What is preventing a country from forcing a certificate authority located in the country to issue f...
Abstract: Access the USG network via VPN, through a Meraki MX84. Summary: I am currently working on setting up some new hardware and re-configuring a network that I am responsible for. The objective is to have an individual VPN into the USG network. The USG is on it's own network behind a Meraki MX84. The USG is connec...
Take for example - AWS STS token or JWT tokens. Let’s say node A got a token for accessing a resource of account X on behalf of account X. Access includes read/write privileges. Let’s say few minutes later the node A got compromised. Nothing else knows that A got compromised. Question Account X is also compromised now....
I am currently developing a Slack app in PHP. I'm trying to make the app as secure as possible, that's for sure. So far, I have done the following: Verified the requests using signing secrets Making sure the requests are less than 5min old (thinking of shortening this time) In the few cases where there is user input, ...
I had a client contact me today because a website I developed (that deals with sensitive information) wasn't loading correctly on one computer on Chrome. After poking around for a while it appears to be caused by the underlying source code being manipulated in Chrome. The code injection (a javascript snippet) appears B...
Over the few months I have used two piece of software on my computer Microsoft Office Google Chrome I can access all my files on OneDrive through Microsoft office without having to save anything on my desktop. My question is, from a security perspective, is it better to solely rely on cloud storage of my data, or is ...
I just had a weird experience that I am trying to figure out. I received a suspicious sign-in notification from google on my gmail account. They had my correct password. This isn't that surprising, the password was old and probably breached and needed to be changed anyway. The weird part is that the attempt came from m...
Why does have IKE have two phases, two levels of security associations, two sets of authentication and encryption algorithms, two sets of options around lifetimes and renogiations? It seems duplicative. AFAIK OpenVPN doesn't have two different "tunnels" established. What's the reason for IKE doing this?
I'm testing a target with osTicket 1.7 for CVE-2017-15580. Instead of getting a shell, I'm trying to get the target to make an HTTP request to a temporary end-point. My temporary end-point is https://test.free.beeceptor.com and the command to be executed is powershell "IWR https://test.free.beeceptor.com". I've generat...
I am trying to leak libc's base address by first leaking the address of gets(). However, using Pwntools to get the PLT and GOT (and pretty much anything) entries only gives me their offsets as compared to the base address. How should I get the actual address of the entries?
I am studying about cyber defense lately for fun and found about a proposed method that as I understand it performs automated SQL injection using brute force by training a model. At some point it says that if it receives input: "SELECT * FRO" it will find that the next letter is "M" and then if it receives HTTP Status ...
HTTPS in an embedded (IoT) system is (as far as I know) not necessarily a good solution. Basic Authentication is not secure. Acceptable in an internal network. Idea: Login.html (when called up) sends a new random number to Browser. With the number, the user + password are sent back in encrypted form. EDIT: Browser uses...
Given 2 entities, A and B: A has a public key( x ) and a private key( x* ). B has a A's public key hash( let's call it h(x) ). A has to prove ownership of x* to B. How could this be achieved, considering the fact that B is not allowed to see A's keys( neither x or x* ), but only A's public key hash( h(x) )? Questi...
My laptop got infected with a virus. It was "cleaned" by a professional but I am now reluctant to transfer files I had on my laptop to other computers. I have plenty of images, MP4s, Word, PowerPoint and PDF documents that I would rather not nuke from orbit. Those are the only files that I would like to save (nothing e...
Can I upload a PHP reverse shell to a WordPress website if there is a directory listing vulnerability in the website? The condition is that I can see the entire file structure of /wp-includes in a WordPress website and I want to upload a PHP Reverse Shell in the directory /wp-includes so that I can get a reverse connec...
I use a .htaccess file in my images directory to block scripts from running. I exclude .php .cgi and so on. But some malware is disguised by naming them with an image extension. I did not previously add various image extensions fearing it could prevent images from displaying on site pages. would adding image extensio...
is there any way to have a good effort time estimation of a Threat Modeling and Risk Assessment activity for an internal infrastructure (about 30 active nodes)? In general, is it possible to find a "best practice" to estimate effort time for an activity that detects threats by using Threat Modelling and estimate the ri...
In many services, email can be used to reset the password, or do something that is sensitive. Sensitive data is also quite often sent to you by email, e.g. long links that enable access to your account or similar. However for most people, their email service provider can read all their emails, can see what is being sen...
I want to create a minimal example where JavaScript injection/XSS is working. This is my example server: const express = require("express"); const path = require("path"); const app = express(); const port = 3000; app.get("/", (req, res) => { res.sendFile(path.join(__dirname + "/index.html")); }); app.get("/api/com...
I am exploiting bluekeep vulnerability in windows server 2008 R2 using metasploit framework. When I run the exploit windows/rdp/cve_2019_0708_bluekeep_rce, it ends in BSOD on server and then server restarts. I searched on internet and found that I might have to change GROOMBASE address in exploit. I am using volatilit...
I was trying to learn file I/O and related function in C, and thus tried to create a baby-version of a virus. Following is the exact code: #include <stdio.h> #include <stdlib.h> int main(void) { FILE *mod_host, *fin_host; mod_host = fopen("host.txt", "r+"); fin_host = fopen("final.txt", "w+"); if (mo...
How are secret keys shared between receiver and sender, especially when we want to have confidentiality that sender and receiver are using two keys, one for MAC algorithm and one for encryption and decryption? How do they share these two keys securely?
I have an old Beaglebone Black board which is similar to Raspberry Pi. Unfortunately, I forgot the Linux login password and can access the Linux using the Cloud9 feature. With this I can log into the Linux as a common user but cannot use any sudo commands. In this situation, I can just wipe the microSD and reinstall t...
What are some techniques to socialize online, while still maintaining privacy, specifically avoiding facial recognition? The main goal here is to make it to where only humans can recognize/track you, while making it to where computers cannot analyze and mass track you. For example, many social media sites and dating si...
Note: I've already read Is it ok to send plain-text password over HTTPS? and https security - should password be hashed server-side or client-side?, but here it's about a specific replacement method (see below). After reading an article about a new authentication method on the Cloudflare blog, I looked at the POST req...
I was researching a kerberoasting attack on the Active Directory domain. To create the stand, I used a Domain Controller on Windows Server 2016 and one client machine on Windows 10. SQL Server was installed on the Domain Controller which was launched from a sqladministrator account with Domain Administrator rights. The...
Suppose I am logged in to Stack Exchange on Firefox on my work computer. This session is clearly stored as a cookie (or something else), because it persists when I reboot the computer. I have sudo access on my computer, but so does the network administrator. This means that they have access to all files on the computer...
When downloading files (mainly software/installers) from pages in browsers, sometimes it comes also with a cryptographic hash or a signature to verify the authenticity of a file against data manipulation (example below). Why there isn't something that automatically says to the browser "Hey, this is the link to downlo...
Someone lives in city A, but their IP address from home always displays as belonging to city B, 50 miles away in the same country. Both cities are the largest in the country, so this is not about one being rural. This sort of mix-up is like saying one is from New York City when all evidence points to them being from P...
I am attempting to brute-force 'DVWA/vulnerabilities/brute/' with Hydra, rockyou.txt password list. I tried using this command: hydra 127.0.0.1 -V -l admin -P rockyou.txt http-get-form "/DVWA/vulnerabilities/brute/:username=^USER^&password=^PASS^&Login=Login:F=Username and/or password incorrect.:H=Cookie: security=low;...
I have a Docker Compose setup that starts up Nexus, Jenkins and Nginx containers. All calls to Jenkins and Nexus must pass through Nginx. I accomplish this by only port forwarding the Nginx container. The Nexus and Jenkins container ports are merely exposed towards the Docker network. This is my (simplified) docker-c...
I have a lot of PCs without a TPM installed. Buying TPMs for all of them is not an option, but I still want to do encryption on them. From what I've studied so far, the entire system/boot partition can be encrypted. The bootloader (or the ESP partition), however, must remain unencrypted. It is the first program ran aft...
I was reading a few articles online about how some firmware can be altered into malware and essentially infect a hardware equipment for its entire life time. Like almost all SSDs in the industry specially the ones intended for desktop use mostly just update their firmware while the OS is running. Now, I am wondering, t...
I have my Raspberry Pi accessible through SSH and I do not want it to reveal any information to port-scans such as below: How do port-scanners (I used Advanced Port scanner on Windows 10) get so much detailed information about the service and the OS (not just for SSH - I mean generally). Which part of the target OS r...
I've heard/read about a number of scams around the internet, and most of the time, the scammer tells the victim to transfer money using Western Union. I might be biased due to my sources, but Western Union is almost always the bank used for such transfers. Why is Western Union so popular among scammers and how do banks...
Lots of solutions to this problem e.g. here and here but in order to decide which is best I'd need to know more about the security implications of each solution (or at least in general). My context: I'm looking into running a rootless Docker/Podman Nginx container (on an Ubuntu Server 20.04 LTS host). Podman gives the ...
My users (researchers) will be storing where their website is on a mysql database on my server. Ideally I want to hash the locations so that when the researchers' participants submit their data to my server, I can confirm whether the website they came from is registered on my MySQL database. If so, I want to save their...
Is there a (relatively simple) protocol for setting up a (6-digit) PIN on a remote server, that also prevents those, who may get a DB dump from the server, from brute-forcing that PIN? Is PBKDF2 and key transfer via TLS 1.2 good enough a solution? Or is there a more appropriate way?
Was typing in my password into an HTTPS website when I started to wonder if my home WiFi (whether a neighbor could have hacked into and monitoring it) is secure. When I type in Username123 Password123 Can the internet provider see it just like that?
Four months ago I lost all my data after an iTunes update automatically restored my phone to factory defaults. I lost all the pictures of my newborn. I understand that when you do a factory reset the decryption key is discarded so the data is unretrievable. There's nothing I can do now. But is there any chance I'll be ...