instruction stringlengths 24 29.9k |
|---|
In large organizations, I often see sysadmins mirroring all the stuff they need from the internet locally (container images, rpm and deb packages) for local consumption, with the burden of keeping the local repositories up to date on your own.
I don't see what is the benefit of that approach compared to having an forw... |
Iso of 32 bit Windows 10 professional english version downloaded from Microsoft's website by using chrome's developer tools to spoof a chromeOS signature, so as to avoid using Microsoft's download tool, resulted in a Microsoft defender alert for HackTool:VBS/InfoGather!MSR. The alert appeared during creation of boota... |
I'm trying to learn a bit more about symmetric encryption and found out that basically every symmetric encryption and decryption is (somehow) in the end based on a simple XOR-Byte-Toggle with using a password and some data.
My Question now is, why do we need to make "secure" encryption and decryption algorithms?
I thin... |
Considering how log4shell seems trivial to exploit and the important control level it gives to an attacker, should we wipe everything affected and start over?
For example, we find out that a publicly accessible server in production has log4j 2.0-beta9 <= Apache log4j <= 2.15.0 used by a service on that server.
Assumpti... |
I succesfully tried to exploit an old version of Apache. A shell is spawned with user www-data (id=33), but I can't "ls" or "cat" anything in /tmp. I can ls the contentns of /bin instead, for example.
I even added a file in /tmp and changed its owner to ww-data but still can't "cat" in the exploit shell.
Why is that ? ... |
I'm installing an old game (32-bit) on my laptop (Windows 10 64-bit). This guide suggests enabling 32-bit applications to run with Internet Information Services (ISS), with the following steps:.
In Windows Search, type "features." Choose the Control Panel app "Turn Windows features on or off" under 'best match'.
Che... |
I want to test some application by sending 2 or more requests at the same time (at the same second or even millisecond) using Burp Suite.
By using Intruder or Repeater I can't do that at literally one moment. They both have the delay is long per second and this is not what I need. So, how can I do that using Burp Suite... |
Can an android antivirus detect or even prevent data-leakage of a mobile phone? Moreover if the user has installed .apk outside playstore. I searched on google, but answers like this: https://www.kaspersky.com/resource-center/threats/data-theft does not answer my question...
|
This is what I understand about SSL/TLS protocol:
Web server sends public key with cert.
Client checks cert validity locally using trusted CA list.
Client encrypts symmetric key using server's public key.
SSL/TLS session created.
Now my question is, what happens if client wants to re-check cert revocation with CA on ... |
I clicked on a Google Slides spoof link in an email in Yahoo mail in a Chrome browser.
As soon as I had clicked it I realized my mistake. I did not enter any password or give away info.
What are the possible consequences of such an attack? How do I proceed from here?
Are there logs I can inspect to find out what the co... |
I was looking for ways to harden the security on my TP-Link router and found the ALG (Application Layer Gateway) settings under the security section.
I have disabled the following:
PPTP Pass-through
L2TP Pass-through
IPSec-Pass-through
FTP ALG
TFPT ALG
H323 ALG
SIP ALG
I think most (if not all?) TP-Link routers have th... |
Considering the following facts, using CSRF token for a restful API (which of course is intrisincly session-less) seems inevitable:
storing JWT in local storage(any where other than http-only cookie) makes the API vulnerable to XSS attack.
storing jwt in http-only cookie makes the API vulnerable to CSRF attack
So in ... |
I've been attempting to learn about the different features and uses of HSMs, and I keep thinking that someone must have put together a set of design patterns for different ways that HSMs can be used to secure different things.
For example, if we imagine the general situation where an organization needs a job to run onc... |
Consider a situation where Alice and Bob don't know each other, and Alice sends some data to Bob and provides a PGP digital signature. Bob obtains Alice's public key, and successfully verifies that the key was used to sign the data, etc, but obviously he still doesn't really know if Alice is who she says she is / actua... |
Some sites lock me out for a while after too many failed attempts.
For our own site, we want to force a password reset email after X amount of failed attempts. After all, if your email is compromised, then everything is compromised.
Further advantages: we don't stop the user in their tracks.
Am I missing something?
|
I have environmental constraints where the cyber and safety functions are segregated such that safety operations are handled by one unit and cyber operations such as firewall, HIDS, secure storage etc. are handled by another unit that is sitting on the same local LAN. Only the unit that is handling cyber operations is ... |
I want to test an Angular SPA for any DOM-based XSS. How do I do that with OWASP ZAP?
|
The ERR_CERT_DATE_INVALID error, I'm sure we're all familiar with, is below
Visiting the same site from numerous other locations, web clients, etc shows a valid certificate.
It's issued by let's encrypt (cert-bot) and auto-renews. Thousands of people have accessed the web app without issue.
Is this a possible MITM att... |
COOP: cross origin opener policy
COEP: Cross origin embedder policy
Most of the articles on the web, related to COOP / COEP, point to the fact that by enabling COOP / COEP , your web page can use the sharedArrayBuffer and some other precision timer related functions.
I understand that there is a bigger concept of cross... |
Digicert has disallowed "double dashes" in the third and fourth characters in new certs:
Effective October 1, 2021, for publicly trusted TLS/SSL certificates, we no longer allow the use of double dashes (--) in the third and fourth characters in domain names, unless the double dashes proceed the letters xn (xn--exampl... |
From an article for the new Log4j vulnerability, it reads here:
A researcher working for Chinese tech firm Alibaba discovered the bug and privately informed the Apache Software Foundation, an all-volunteer corporation that develops and maintains open-source software. It spilled into public view when Minecraft made its... |
I'm really struggeling with understanding CVE-2021-42550. Logback says:
A successul RCE attack with CVE-2021-42550 requires all of the following conditions to be met:
write access to logback.xml
use of versions < 1.2.9
reloading of poisoned configuration data, which implies application restart or scan="true" set prio... |
The way I understand is that if someone wants to pretend to be John Doe by using his IP address to conduct nefarious things on the internet, it would not be possible because
traffic would only be one way
the ISP would immediately detect it and flag it, and
the Wifi router would immediately reject the incoming traffic
... |
Some of our users on our website have two or more accounts they use to log in. With each device they log in a specific device ID is generated. This device ID is stored on the device itself and on the server. We use this device ID to confirm whether the device needs to fill in a 2FA code or not. If we don't recognize th... |
I'm using MySQL with Mybatis library. And I found the code below:
SELECT *
FROM tableA
WHERE xxx
ORDER BY ${inputA} ${inputB}
LIMIT #{inputC}
I know there are many ways to inject the ORDER BY, but haven't found any example of injection in ORDER BY with a LIMIT behind.
I tried UNION SELECT, but MySql doesn't allow to ... |
I set up the following lab using HAProxy and Gunicorn.
Both "Smuggler.py" tool and "HTTP Request Smuggler" BurpSuite extension detected CL.TE vulnerability.
I checked it manually by sending below request:
Here is the request in HAProxy:
and, this is the request in Gunicorn (processed as two requests):
So based on ... |
I have a java web app. I'm using OWASP Java Encoder to encode for html, javascript and url components to mitigate reflected XSS. I'm new to this so I'm not sure on how to test on my web app for the following scenarios where there's no direct user input. So I have the following questions with examples. The java variable... |
I was accessing some sites with the Tor browser. I got the URLs from some site and was hitting them one by one just to explore. Suddenly pages stopped responding but the internet was working fine. Then after a minute or two I get a popup from my phone application asking to enter my PIN to complete a transaction. 10 dol... |
Sometimes when checking whether requests are cross-origin, applications check whether the origin contains the whitelisted domain. This makes it possible to bypass the white-listing by including the whitelisted value in the subdomain.
E.g. example.com only allows requests from domains containing example.com. The attacke... |
Software that has packaged a vulnerable version of the log4j library is considered vulnerable to CVE-2021-44228 or "log4shell". When I look at the NIST definition I can see that the vulnerable versions of log4j are listed, as well as configurations for applications from Cisco, Siemens and Intel which used the affected ... |
Usually once you register in a website you need to visit a url like:
https://example.com/user_activate/^random_string^
Does the ^random_string^ necessarily need to be cryptographically pseudorandom instead of a time-based random one?
I mean is a necessity to use cryptographically secure randomness such as openssl_rando... |
As I see in this answer that cryptographically secure randomness is a must in user activation urls such as:
https://example.com/user-activate/^random_string^
But what are considered best practice regarding:
The length of the random string. I mean, how big must the random string must be?
For how long must I wait for t... |
I want to know whether the SHA256 of a file changes from being available for download to once we downloaded to a device.
For example, I got the URL https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B7E34C753-0D4E-7F51-19E4-EBB7979C40B3%7D%26lang%3Den%26browser%3D5%26usagestats%3... |
Recently, the log4j issue got a lot of attention. I run a chatbot web app that is not based on the JAVA stack. However, there is a backend component that analyzes the chatbot user input which is based on JAVA. I wonder to mitigate the log4j issue, whether scanning the text input as a pre-processing in the backend and r... |
Why do we still use RSA 2048 when we know that quantum computers can crack RSA as fast as classical computers can create the key?
Providers, governments, APTs, etc. can sniff all the traffic and as soon as the day comes when quantum computers are mass-capable, all the traffic in the world, including past traffic, is pu... |
I'm testing an application that allows the user to provide an XML file that will be processed. (I've already tried typical XML attacks, such as XXE.) One of the elements of the XML file allows the user to specify a .NET type that will loaded by the application, by fully-qualified type name.
I cannot import new assembli... |
I am on a 192.x.x.x network and have a local server that hosts some webapps for the local users of the network. The server is running:
Ubuntu
VPN
Nginx Reverse Proxy with the site.conf including: allow 192.168.1.0/24; deny all;
Locally generated SSL certificates, with root keys installed on client machines
When I nm... |
I was testing a small webpage using Django's built-in server. The webpage simply shows the IP of the visitor of the webpage, and prints the IP address in the terminal. The server is hosted on a Ubuntu PC at my home IP address, with the domain name pointing to it proxied using Cloudflare.
I was looking at the output whe... |
I have an API that responds to requests with a JSON that contains app updates and advertisements.
Requests are sent by my SDK that is implemented inside my game.
I need authentication because JSON responses contain some advertise provider keys that I don't want to be accessed by others(those who may send requests to AP... |
Proper security algorithms demand true random numbers. For instance, secret keys & initialization vectors should never not be true random.
However, generating numbers using Java's Random library or C's srand() initialization & then rand() are only able to generate pseudorandom numbers. From what I understand, since fun... |
I have a problem that when I try to open multi handler in msfconsole to exploit android, the sessions are not showing. But when I connect both PC and android to the same wifi, then the sessions are showing.
Can anyone help with it?
|
I am trying to figure out if the solution I am suggesting is valid for both XSS & CSRF protection,
I would like to store the JWT in an httpOnly & secure cookie and not in local storage,
when the user successfully logs in, he will get (in addition to the cookie) a CSRF token(random string) in the response payload, same ... |
I was recently having a conversation with a friend about his server system (he does a lot of self-hosting) and he mentioned he was in the middle of configuring SELinux. I was curious about the comparison of that over AppArmor for his use case. Of course, I've always heard that SELinux is more secure due to the consider... |
I recently found out that my coworker who is domain admin in a large organization told me that he can monitor all keystrokes of any PCs in the domain he'd like and even he can look at any screen to see what user is up to.
Later I found out that he even check what I have in my computer without knowing my password in jok... |
My goal is to find malware that performs network activities and captures the traffic with Wireshark. I have a Windows 10 laptop host machine and VirtualBox which has virtual Windows 10 machine.
I am scared about the safety of my host machine. How can I be safe for this type of analysis which needs an internet connectio... |
I am doing some tests around ssh. From what I have seen a server usually has multiple host keys. When a client tries to connect, it tries to negotiate which key types to use DSA, RSA, ECDSA, etc. But on key signature confirmation by the user, those host keys are added to known_hosts.
This brings up my problem:
I am su... |
I have been looking into XSS pertaining to base64 encoding a data URI into an <object> tag (which is typically considered only a feasible XSS payload in Firefox), but I am failing to understand how this is a XSS attack? For example (I didn't base64 encode it so that you guys can easily read it):
<object data="data:text... |
First, thanks in advance and sorry if I'm asking some really silly thing, this is not my expertise :)
I have a webserver just for testing my things. Last week I checked if it was vulnerable to log4j CVE and it seemed only Jenkins was using some trace of log4j but inside slf4j (https://www.slf4j.org/log4shell.html) whic... |
If users are authentified with a sessionID (through cookies), would it increase security if we force users to log in again if for any reason their IP changed during their session?
Or is this not worth and would just impact UX for maybe a mobile user?
We also want to send a notification when a new log-in happens with a ... |
I have an HP Proliant server. I have been using it for several years. Sometimes I used its iLO web interface via WAN (I have forwared required ports) completely ignoring all warnings from my browser about the server certificate being invalid. Recently I have learned many information about SSL/TLS and MITM attacks. Now ... |
I'm running tests on my devices. But I'm scared that by doing this, I will make my devices vulnerable. If I executed a backdoor sent to me (being an app with a payload on it, or doc, or email, etc), my device will become vulnerable to only the IP of the attacker (me), determined on the payload? Or it will be vaguely vu... |
I am a fairly security conscious web developer. One of my clients has their website hosted outside their corporate system, but all other services, including email and domain services go through their corporate IT Dept.
Their web host changed IP addresses, so I sent the new information to the corporate office for them t... |
First of all, I did ask this on OpenWrt Forums already, I thought maybe someone here knows this.
I noticed that my internet speed gets limited when this feature is not enabled, this feature is also marked as experimental, any clue what it actually does and whether it has any security implications?
I tried googling, it ... |
I'm running a seemingly normal Win10 system with updated drivers, both through standard Windows Updater and manual patching if a new driver is available.
The Dell logo flashes multiple times per boot.
There is always a long freeze every boot.
Computer is running standard programs poorly.
Webshells of websites are now t... |
I'm a bit confused by something regarding Tor. As per what I have read and confirmed in this answer Tor: Is a Diffie-Hellman key exchange being done over recipient of traffic? the client does a DH key exchange with each node in the relay.
This results in 3 shared secrets and the client encrypts the message 3 times with... |
I’m in the process of building a secure document storage on behalf of users of a web and mobile application. The goal is to have end-to-end encryption, as in documents will be encrypted and decrypted on device, but not require users to manage a private key themselves.
The plan is to use libsodium to encrypt documents u... |
My question relates to a concern about theft in specific. I'm not worried about the FBI cracking the password. I'd like to know whether three characters for a local password, a password for macOS login of a regular macbook device to be specific, is long and complex enough to prevent somebody who's stolen my property fr... |
With the authorization of the owner, I was testing a website and when I put in some sql query and has some syntax error, it shows me, but when I test it with a parameter like
p.php?id=66+/*!60000select*/+*+/*!60000from*/+data
the output does not appear, but I know that data is a valid parameter because if I put in some... |
I have an object that is stored in the server side of the application. It is never inserted into the DOM. The object looks like this:
{"id": "34245425", "field": false, "information": [{"message": "For input string: USER INPUT HERE"}]}
It adds backslashes before inserted quotes and always makes the backslashes break th... |
I am using Google workspace to handle my domain emails. At a certain point, employees started to receive spoofing emails to their @mydomain.com addresses. I blocked these emails and it worked.
However, after I blocked it, employees started to receive spoofing emails to their personal accounts from spammers who pretend ... |
Modern browsers don't allow cross-origin requests - those must be explicitly allowed by CORS headers. But looking at Java back ends like Tomcat/Spring MVC I see that it's possible to reject requests from other origins on server side.
Since browsers handle this on their end - do we really need to care about it on server... |
I'm trying to work out some basic knowledge of rate-limiting for my server security so I know how it works. Seems pretty simple as there are different algorithms as well as IP limiting methods. This is not what my question is about, I will be using packages in the end but, in playing around I have discovered:
If I goog... |
I have faced this situation several times. Some websites are presented as a potential security risk. Should I continue to browse such a webpage?
I am attaching one example, just an example. Actually I need a general answer.
I was trying to find out the specs of some equipment made by Gilardoni, an Italian company. I fo... |
I want to crack a specific hash password with JTR:
48bb6e862e54f2a795ffc4e541caed4d
I put this hash in a txt file like this:
echo '48bb6e862e54f2a795ffc4e541caed4d' > hash.txt
and I run JTR in this way:
john hash.txt --format=md5crypt --wordlist=/Users/ludo/Documents/TryHackMe/Dizionari/rockyou.txt
The result of Joh... |
In a scenario where an attacker has control over the src attribute of an img HTML tag, they could easily inject a simple JavaScript XSS payload like the following:
<img src="javascript:alert(1)">
The attacker can not manage to leave the src context. For example, the code that causes the above cause could be similar to... |
I have multiple salted hashes and I know the passwords, but I want to know the algorithm used to make the hash.
For example,
hash dcdc884c4ead4f713e9d15c1e14f5b07dfe184ea
salt 93295
password xx123123
Is there a way to know that? Thank you.
|
I misspelt google as "googe" (very dumb, yes). It took me to a page that asked me to enter my birthdate. The URL was something along the lines of luj dott proasdf dott com
After going to malware index, it looks like it redirected to the same page as the infamous goggle site. It is labelled as a browser hijacker. I didn... |
The password of the user shall be used for client side encryption. A PBKDF and salt shall be used to derive a key from the user password.
Do I need to store this salt on the server and deliver it to each new client/device the user authenticates from? (I'm assuming here that the client can't store the salt, otherwise he... |
Trying to test the conformance of the certificates inside our application, with the below requirement:
The application shall [selection: invoke platform-provided
functionality, implement functionality ] to generate asymmetric
cryptographic keys in accordance with a specified cryptographic key
generation algorithm
RSA ... |
I'm currently working on a software project as part of a course on Operating Systems Security and one of the features in my project is to detect bruteforce attacks on Windows hosts.
I know that I can easily accomplish this by checking for event ID 4625 and other events in Windows Event Log, but I want that my software ... |
I am trying to find out if TLSv1 and TLSv1.2 are disabled, so I am using the following commands:
openssl s_client -showcerts -debug -connect servername:port -tls1
openssl s_client -showcerts -debug -connect servername:port -tls1_1
openssl s_client -showcerts -debug -connect servername:port -tls1_2
I am getting very di... |
In 2017, the FDA approved a pill with a digital sensor that can transmit information accessible by a web portal.
If a patient takes such a pill, can it be used by hackers to track the location of this patient?
|
I have been using an alcatel hotspot that has been provided to me and I was seeing if they can see my history/app activity even with a obfuscated vpn connection.
|
I received an email containing blackmail about videos that the hacker said he recorded. He said that he recorded the user of the laptop masturbating and he is asking for money to delete them otherwise he'll send it to the user's family.
First I thought that it was fake because this is how it looks like, but to be sure ... |
Recently, various companies have been sending me emails from addresses like
support_at_example_com_r1a8nd4o6m7@icloud.com.
I used to be able to determine if an email was not a phishing email by looking at the domain, but that method is not available when the domain is icloud.com.
Is there any way to know which company ... |
I noticed more and more times that some mobile apps are able to block requests, and they don't forward those requests to the server if they're going to be intercepted with a proxy like BurpSuite. This not happens for all installed apps on my device but only on fewer ones. At the beginning, I thought that it could've be... |
I have been requested to send a copy of a past year tax return to a US state office. I have been in contact with a tax official by email to send this copy through various means. This state is a few thousand miles away from my current residence.
What would be the most- to least- information-safe approaches to transmitti... |
Context and assumptions:
TLS 1.2 or 1.3, server authentication only
Client uses HMAC to authenticate itself to the server, using a PSK key
Client is a library, not a web browser, which doesn't allow to "click-through" certificate errors
Security of TLS itself is not compromised in any way, e.g. by adding rogue certifi... |
Someone I have been dating has suddenly bought me a brand new iPhone. I have legitimate reasons for harbouring a niggling suspicion that this could be a ruse to steal passwords and bank details, just as I am about to receive a large sum of money.
I am about to fly out to stay with my new flame, and the plan is that I s... |
I am preparing for the Sec+, currently reading the book, "Mike Meyers .... Certification Passport"(book in question is irrelevant to the problem), In the cryptography chapter, topic-public key/asymmetric cryptography
It says
"the sender encrypts a message or file with the intended receiver’s
public key.
To decrypt thi... |
I downloaded TikTok once - about 2 years ago. I never created an account, and I deleted it about a week later.
About a month ago my youtube feed started getting TikTok reccomendations. I'm curious as to how this could have happened suddenly?
Does TikTok track a person even if I don't have an account?
If so, how do I p... |
Microsoft Exchange was recently affected by an issue involving the way they stored timestamps (overflow). Could this, and similar bugs, be exploited by an attacker?
|
My friend handed me a .exe file of an old game we want to play together. My laptop has important files, so I do not want to install it immediately. I am still sceptical that he might not know it contains some malware.
So, I thought about playing this game on a virtual machine, like Hyper-V, or even the Windows sandbox,... |
I am making a website with the goal of blocking bots that are trying to login from different IP addresses constantly... while still allowing regular users to login via Tor.
One of the approaches to preventing distributed password cracking attempts is to place an exponentially-growing block on any IP address that submit... |
I have an interesting situation on my hands. There are people in my neighborhood that have been harassing me for some time now. It appears that these individuals can are receiving my text (sms) messages and iMessages as they literally yell out information from personal conversations I'm having with my friends and famil... |
I'm aware that SIM cards can store malware according to this question but what equipment would be needed to do such an attack? For example, would you need a Computer and a SIM card reader or could it get infected from a normal Android phone?
|
I know Remote Desktop Protocol can be incredibly insecure if handled wrong. Knowing no system is 100% safe, are there any easy to exploit vulnerabilities in the described system below;
ZeroTier VPN:
Private network. Join via NodeID.
Every member must be manually approved by admin before granted access to the network.
... |
I want to create a secure messaging application such that you don't have to trust the server.
Register with username and password. ->
Generate a pair of PGP keys (RSA). ->
Encrypt the private key with the password. ->
Hash the password
This is what the server knows:
username
pubKey
AES/CBC(SHA256(pass), privKey)
SHA... |
I wanted to understand what elements of financial information need to be protected/encrypted. Understand that information like IBAN, bank account name, bank account number are personal data and need to be protected.
Unsure whether the data elements such as bank bic code, bank swift code, bank cc, bank code are personal... |
I have a linux instance deployed on AWS EC2.
Sorry for my dumb question, but I'll ask anyways just to be safe.
Q1. While creating an instance, I set anyone 0.0.0.0:0 for the ssh. Though, on the next step, it asked me to create private/public key pair. So I did. Question is will anyone be able to somehow attack it ? I k... |
On our server, we have TLS 1.0, 1.1 and 1.2 enabled. It hosts numerous client websites.
We were recently contacted by one such client flagging a concern that TLS 1.0 and TLS 1.1 is "still enabled". I don't know much about the subject matter, unfortunately. What I do know is, like me, they must've done a free security s... |
Now that OpenSSH supports Elliptic curve security keys (since version 8.2), it's possible to generate a ed25519-sk key on a hardware security key:
$ ssh-keygen -t ed25519-sk -C comment
This generates a public and a private key parts. How sensitive is the private part that goes into file ~/.ssh/id_ed25519_sk?
As it see... |
After generating an OpenSSH EC key on a hardware security key:
$ ssh-keygen -t ed25519-sk -C comment
Is it possible to use this key with Google Chrome SSH applet or Mosh, in particular on non-Linux machines where there is no ssh command available with proper HW key support?
|
I am reading about implementing UUIDs in URLs instead of incremental IDs to reduce attack vectors using obfuscation. I plan to create a UUID from an incremental ID and store the UUID which would be used to access the data.
As per the specification UUID v3 and v5 use names and namespaces, hashing both using either MD5 o... |
I have to install some apps on my personal iPhone developed by a large company. My phone warns me that they're "untrusted enterprise developer" and not the "App Store"
I must give authorisation in order to use the app, but I'm worried that Apple's private APIs may be used in the apps as they don't come from the "App St... |
While implementing CSP, there are two options.
Implement CSP in the HTTP response header
Implement CSP using a meta tag <meta http-equiv="Content-Security-Policy" content="default-src 'self'">
Out of the above two, which method is more secure and why? Why the other is less secure?
|
Most tutorials that cover smartcard functionality of the Yubikeys use slots
9a (PIV Authentication),
9c (Digital Signature) and
9d (Key Management).
However, there are also slots 82-95 (Retired Key Management) available:
These slots are only available on the YubiKey 4 & 5. They are meant
for previously used Key Mana... |
Here is the code which potentially can allow a timing attack
$user = getUserFromDatabase($input_username);
if ($user === false) { // potential timing attack
// user not exist
http_response_code(401);
echo json_encode(["message" => "invalid authentication"]);
exit;
}
if ( ! password_verify($input_passw... |
I'm brainstorming a good architecture that allows me to store user generated data from my mobile app securely on my backend server, without forcing the user to remember an encryption password.
The data should only be accessible to the user who generated it, possibly personal data. I need to be able to decrypt it on mul... |
I'm writing Java code for a decentralized network. (Proof of concept code here.) Each node generates its own self-signed certificate, to be used both server-side and client-side in every connection. Current key choice is 4096 bit RSA. I figured I'd use TLSv1.3, since AFAICT that's most secure (though only marginall... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.