instruction stringlengths 24 29.9k |
|---|
I have been doing research on malware detection and my current setup is: one host OS (Ubuntu 18.04) and one guest OS (Ubuntu 18.04) inside VirtualBox. I have downloaded and executed some malware (including Linux, Windows and OS X platform malware) to the guest OS. But I can not visually see the effects of the malware, ... |
My Web API acts as a proxy for users to connect to another server: User ➡️ My Server ➡️ Any Internet Server. They do that by specify a hostname ftp.example.com or 111.111.111.111. I do not want them to mess with my own server by entering localhost or 192.168.1.1 so I think I will blacklist them. Added info: It is safe ... |
I came across this issue when we implemented a new security solution. Said solution has its own root CA certificate and will create certificates for HTTPS web pages "on the fly". Each HTTPS page you visit now has an "instant" certificate that is issued by the security solution's CA and not its original certificate.
Wha... |
I was trying out SQLMAP on DVWA (medium security for SQL injection), and I did get a set of payloads (sqlmap chucked out a few payloads that should have worked). But entered manually, I couldn't get the payloads to work. If I let sqlmap do the job, then it works. Can anyone tell me why this is so?
sqlmap -r data.txt -p... |
I've implemented second factor authentication for my web app via FIDO U2F, and am testing using a Yubikey.
I have read that it is best practice to associate multiple hardware keys in case one is lost, but I wanted to know what the security implications were, as documentation is fairly sparse.
When an authentication att... |
Instead of having a landline at each employee's desk, allow them to add an eSIM to a compatible personal cell phone. (If possible, disable SMS for the added eSIM so it is acting as a replacement for the desk phone.)
Unmanaged phones are often used for MS365 and MFA already.
What MUST be considered when adding a company... |
There is a very similar question (Different SSL states as seen by Safari, Chrome and Firefox)
but with a different failure reason so I am posting this one as I think it is slightly different debug.
I have been trying to clear various browser states. Is there somewhere else (DNS?) that I should be clearing that could b... |
Imagine starting with a basic site which has no links and no code which stores tracking cookies. Assume the site should remain that way as it grows in features and content.
What are the mechanisms which could result in 3rd parties to implicitly starting to gather cookies (to track visitors of my site).
Implicitly means... |
There is a firewall deployment case called "transparent mode", when the firewall does its job without routing and having IPv4 addresses, i.e. it is invisible.
"Stealth mode" is mentioned as one of the advantages:
Because transparent firewalls do not have an IP address within the
network, they are more stealthy and und... |
I have two hardware tokens (Thales/Safenet eToken 5110cc) that both contains certificates for various uses.
I'd like to add only one specific certificate to ssh-agent, however I'm struggling to find the correct PKCS11 URI (described in rfc7512)
For test purposes both tokens use the same pin code, as with every try if t... |
I'm toying with the idea of setting-up a Tor node (middle/guard) and an I2P node on the same VPS. I think that should be safe(ish)...
But I'm wondering what other services I could run without it/them compremising Tor/I2P or vice versa. Obviously I will open up a larger attack surface (which is bad), but I'm thinking ... |
Let's say I have bought a USB-to-Bluetooth dongle and "paired" it with my wireless Bluetooth headphones which I purchased by accident, thinking that they were wired.
One of the biggest reasons I've always avoided wireless network, wireless mouse, wireless keyboard and wireless headphones, in spite of their obvious prac... |
I understand that nowadays passwords are not stored in plaintext, only as password + salt and hashed (minimum). But I haven't found any exact confirmation that gpg does NOT store (cache, place in RAM) the passphrase in plaintext.
And if a password is stored in plaintext, i.e. it is decrypted repeatedly using this passw... |
I am using Windows 7 and I had to re-install Chrome recently.
In doing this, once I had deleted my browser history and used BleachBit, I told my email server (Outlook) what email address I was accessing, then provided it my password.
Now, after re-installing Chrome, the Outlook server knows the email address I use, des... |
Based on my understanding, some types of HSMs allow custom software to be developed that can run within the HSM's secure enclave. This capability allowed Square to do something very clever to boost the security of their cryptocurrency cold wallets.
In a nutshell, the HSMs that control the private keys for their cryptoc... |
I have some confusion between the different public and private keys that are used in a TLS 1.3 connection. When a client makes a request to a server, I've always thought that a server's TLS x509 certificate was passed to the client and certificate was used to encrypt traffic between client and server. However, as I rea... |
Scenario:
A hospital has the records of all patients. There is an online portal where patients can login to see their personal medical data.
Since a hospital is an obvious target for any type of hack, the hospital decides to implement DDoS protection. Using providers like Cloudflare, would have this personal data flow ... |
Suppose I'm working on a computer and write a C program which invokes undefined behaviour. Since anything may have occurred, a (perhaps paranoid view) would be that anything the computer does thereafter is no longer trustworthy. For example, it may have rewritten the compiler, or modified the clock. Is it possible to r... |
I've read the docs but could not find an answer to my specific question (or didn't understand which one was the answer).
My question context: after I mount the encrypted partition USB drive) on Win10 it is seen as a regular partition and I can move files there. I move files using windows explorer - normal copy-paste in... |
When verifying a pgp signed message using GnuPG, one gets an output similar to the following:
gpg: Signature made Fr 07 Jan 2022 13:42:21 CET
gpg: using RSA key 610B4AFF906E6890EEDC797201E99CB6C034BC3B
gpg: issuer "name@domain.com"
gpg: Good signature from "Some Person <name@domain.com>" [... |
I am working on a deployment where the customer is requesting to do things differently from our standard process for client authentication. Usually we generate a CA for a customer project, get them to generate a CSR, we sign it with the CA, then we give them the resulting certification. We then configure nginx to trust... |
A while ago, I was tipped off that it's a good idea to check if the password provided at registration is contained in any list of leaked passwords. I'm not in the information security field, but I really like to take aspects like this seriously, I always think about the issue of passwords. The website haveibeenpwned pr... |
We are a merchant that do exclusively MOTO transactions over the phone. To capture credit card information, our sales agent (on their PCs) uses a browser to access an internally developed ASP.NET application which serves as a Virtual Terminal application. We qualify as SAQ-C-VT.
The VT Application uses a JavaScript l... |
Lets say my web client gets a JWT token for authentication so it can make request to the API server. Now, I'd like to create a public API (which will basically be the same as the api for the web client with minor changes) so people can make requests outside the webapp. Is it okay to use the same JWT token used for the ... |
I have a scenario where I need to implement OAuth 2.0 authorization code flow on the server side - the user authorizes a backend service against Microsoft, the service receives a token, saves it in a database and uses it to perform daily background jobs on the user's data. The token itself is neither needed nor receive... |
The password hashing competition, started in 2014 and Argon2 was the winner in 2015, listed evaluation criteria for the competition. There is an interesting one in the Functionality section;
Ability to transform an existing hash to a different cost setting without knowledge of the password.
This is a quite good funct... |
Not looking for any solutions here, just explanation. I work remotely for a university in another state; they supply a proprietary VPN to connect to their network. I work on a Ubuntu machine and for hygiene, have set up a separate user account for the university work. I normally switch back and forth between my Work... |
I have a site example.com that I am currently intercepting https traffic for and pointing it to my local server using fiddler. I would like to take fiddler out of the equation by installing the site's certificate that is generated by fiddler on my local server and modifying my HOSTS file. How can I export the key and t... |
When loggin in to a website, A Bearer token is generated and echoed back from the server in a JSON reponse. After this, each request sends the generated token in the Authorization: BEarer header.
However, there is a API endpoint which reflects the request Origin header value in Access-Control-Allow-Origin and carries ... |
when I visit "https://www.ebay.co.uk", I can see a trust seal at the bottom right of the page that says the certificate is issued by DigiCert. It is a clickable trust seal, so when I click on it, it takes me to the DigiCert website.
My confusion is due to the certificate that ebay website send to my browser. When I cl... |
Goal: I am building a app, i want to verify user's mobile number, the way i am using is when user enters the mobile number, I send OTP to that number and ask user to enter the otp to verify the mobile number is in access to user.
The way i am doing this is using users own Sim card to send SMS and doing all procces with... |
I'm currently dealing with a SQL injection problem that involves an input being taken and put through a function that replaces all ' with \' and all \ with \\. I've tried a lot of things but I don't seem to be able to escape from the string literal.
Database encoding: UTF-8 (not GBK or any other vulnerable encoding, so... |
What is this restriction for in terms of safety? And when connecting external drives via USB, the root password is not required. I can't understand the logic.
I use the following rule in the fstab to connect the internal drive at runtime:
LABEL=disk /media/user/disk ext4 rw,nosuid,nodev,noexec,discard,relatime,user
Ho... |
When I type a password somewhere, I see placeholders (black dots) in place of characters. But sometimes, there is also a toggle button to view the password like in a regular input field (typically an icon with the shape of an eye, or a text like "View password"). I've seen this kind of fields mostly in browsers.
On the... |
I'm working with a developer to develop a web application. For one aspect of this application, I need to allow hundreds of merchants to deliver non-PII and non-sensitive data to my website. The data will be used to pre-fill a form on my website and eventually submitted into my sites database to be scored.
I was consid... |
Where can I find the list of what each PCR "represents" in the TPM for a Linux OS? The official guide I found (https://trustedcomputinggroup.org/wp-content/uploads/TCG_PCClient_PFP_r1p05_v23_pub.pdf, section 3.3.4) has the following list:
These all seem to be about the boot process, such as UEFI, BIOS, boot loader, et... |
In rop, often a gadget has an undesired pop or push in the middle.
For a pop, we handle this simply by adding a dummy value to our chain: it is popped, and all is well.
What about a push: What do we do to our chain to handle it? It seems to me that since a push first decrements SP and only afterwards writes, it will br... |
Can viewing and editing a potentially infected microsoft word document (with images inside) on a web-based platform like office online (OneDrive) infect my pc? How does the browser running on my machine display the content of the remotely uploaded document?
|
I'm running a pentest and I've managed to get man-in-the-middle access between a machine and a domain controller. A process on the machine will log into the DC, as a domain admin, to get a Kerberos ticket. I can see the AS-REQ/AS-REP & TGS-REQ/TGS-REP packets in Wireshark.
I want to take either the TGT or TGS that the ... |
I was trying to add a new certificate to our truststore. But I got the alias already exists error.
I can't remove the old certificate yet, but I have to add the new certificate.
Will it matter if I imported the renewed certificate on a different alias?
The existing certificate alias: *.example.domain.com
I'm planning t... |
Before I give away my dead HP Officejet 8600 Pro for recycling, I want to ensure that no memory remains on it. Even after extensive research, it's not easy to find conclusive information on whether a home printer retains memory or not (and if it does retain, how much). Supposedly the printer has 64 MB of built-in RAM, ... |
Suppose the server can provide one cookie and one token. Then I set them when the user login. The cookie was set to httpOnly and the token will be saved in localStorage. Both of them will be sent back when the user performs submission. AFAIK the cookie can prevent leakage by XSS and the token can prevent CSRF. Can I pr... |
Say my home network has a wifi-password and my friends are connected to it (since I gave them my wifi-password).
Is it possible for me to read their data transfer?
If yes, then it would also be possible for them to spy on the other users in my home network, right?
I was just curious since public networks are very unsec... |
If I am using a VPN, what does the website or app (like Netflix) see when I am downloading or uploading?
For example, if I upload an image, will they see that I am uploading from VPN's IP or my IP?
|
I know that game companies ban cheaters' hardware IDs so they wouldn't be able to play on their server anymore.
I also know that there are programs used so the client system sends a randomly made-up hardware id to the server. (like Virtualbox)
So I've come to the conclusion that IT IS POSSIBLE that some hacker, for exa... |
I'm building a web app in Node.js, Express, and Mongoose. I'm worried about security and optimization issues on what to send in the email link.
I see many of them sending: /:userId/:token, but if I would insert in the link only the token it wouldn't be the same? I thought that because in this way userId isn't shown in ... |
Could one malicious email attachment contaminate all attachments in my cloud email account? There are various preview functionalities available in Gmail or Microsoft Outlook that would effectively interpret attachments like images or PDFs on the server. There must be some protection in place, right?
|
I just noticed a strange loop device that was added to my machine today.
It is mounted under /run/media/<user>/CENA_X86FREE_EN-US_DV9 and seems to contain Windows files, probably a Windows installer with a bit more than 4.1GB used space (directories boot, efi, files bootmgr etc).
It seems to correspond to /dev/loop1 (3... |
Today I have a web application that needs to store the user's email and password, so that when he opens the login screen, the authentication is done automatically.
For this, our application saves the email and password in localStorage, unfortunately in plain text and it's not the best option (secure) for that.
It is do... |
I'm looking for some domain name whose purpose is to act as a bogus malicious/suspicious/untrusted website or endpoint to be used as an example or in documentation.
IANA has reserved example.com for general purpose, is there an "evil" counterpart run by any organization? Something like "suspicious-website.com" or anyth... |
I am trying to figure out how this one phishing email (used our Company's domain as from) was able to bypass the O365 Spamfilter.
Looking at the Header it looks like they passed the DKIM even though the Domain that is used differs completely from the sender domain.
smtp.mailfrom=contoso.com; dkim=pass (signature was ve... |
I'm not an Information Security professional, just a worried layperson.
A few years ago, when I was logged into my own account on a shared laptop, the disc space mysteriously kept filling up. I deleted vast amounts of videos and other large items to free up memory, but the 'almost out of disc space' messages kept comin... |
Consider mobile authentication applications, such as Microsoft Authenticator, Google Authenticator, and LastPass Authenticator. They all offer 6-digit MFA authentication, but this is not my focus; my focus is on notification verification, which (I believe) all three support.
The flow:
User requests to log in to a serv... |
I'm struggling to wrap my head around the following thing:
I have a video adapter (NVidia). It was bought new about a year ago and had the newest video drivers at the time
I disabled all the NVidia updates, stopped all their services / consoles / helpers / whatnot
Let's say I play an older (2015) video-game - all good... |
A common way to ensure integrity of a file uploaded from a client is to include the md5 header in the request which can be used by the server for the same.
I would like to know that if a file can be corrupted on its way, then why can't a header be corrupted thus causing the server verification to be useless.
|
When it comes to defending against MITM attacks while using public Wifi, is the security offered by iCloud Private Relay comparable to using a VPN?
Edit:
My motivation for asking the question comes from the PDF overview published by Apple. In it they say:
“It’s built directly into the networking framework of iOS, iPadO... |
I used to download a lot of mp4's from untrusted sources. But I discovered that they could contain malware. I would like to know if there are any methods to clean or to check video files for malware.
|
Suppose I have a web application that uses OpenID Connect to enable users to log in with one of several 3rd party identity providers (e.g., "log in with Google", "log in with Facebook"). I do not associate the 3rd party identities with a local identity (there is no way to bind a Google account and a Facebook account li... |
There's a web application on a server which I have full access to which accepts POST requests on a REST endpoint. The request payload is expected to be an XML document. For request routing and load balancing the server makes use of HAProxy, which also takes care of the TLS settings and has the certificate chain and pri... |
I have recently watched an interview with a guy discussing how to drastically diminish your digital footprint. One of the points argues that VPNs should be used all the time:
DO NOT use a VPN when dealing with banking services or anything
confidential, but do use it when publicly surfing the internet.
I do not rememb... |
There is an attack on Active Directory named "Kerberoasting": https://attack.mitre.org/techniques/T1558/003/
I ask TGS for ticket to access some SPN
Part of this ticket is encrypted with SPN's password hash (something that only TGS/KDC and SPN may know)
I brute force this hash offline to obtain service password
My qu... |
Let's say I make an id of type ed25519-sk and have it reside on my yubikey. OpenSSH makes two files, id_ed25519_sk, a stub private key, and id_ed25519_sk.pub the corresponding public key.
If I lose these, can I regenerate them with just the external physical key?
|
When using incognito, any data will be cleared when the session is closed.
Then why do browsers have the option to disable them?
|
A bit of background:
I am a web developer and sometimes i integrate some form of external API in my web applications.
It's the second time already that i find something strange: some APIs instead of accepting messages through HTTPS, require that i send the message over HTTP using some encryption algorithm to encrypt it... |
What are some of the risks when encrypting "plaintext" with a receiver's public key?
I have been Googling for hours, and been reading in the Computer Security Principles and Practice 3rd edition.
It's NOT similar:
In PGP, why not just encrypt message with recipient's public key? Why the meta-encryption?
|
I'm working with a dev agency for a web-based platform. Here is how they are planning to handle sign-ups on the platform as well as log-in and password reset.
Is it a good, robust and secure solution?
Registration:
We use library ‘crypto’ and PBKDF2. Parameters for this function: password, salt, iteration number, hash ... |
There's a certain website designed so that junior QAs learn to find bugs. Trouble is:
it's http://
there's no IP filtering
users are very junior so they use their real names as user names and probably reuse their only password.
I do not intend to attack it nor do I have anything to gain from that; furthermore I've in... |
I have a microcontroller, connected to my WLAN, that hosts a tiny web server. I can reach the http server via 2 ways :
either via a domain (admin.example.com) which acts as a reverse proxy to the ip of the microcontroller.
or via the software enabled access point (192.168.0.49) spawned by the microcontroller.
If I re... |
Say I create a certificate with some content and then sign it with my private key. Now, I decrypt the sign with a trusted CA's public key and somehow come up with content that can match the decrypted value and use this content to replace the initial content which was signed. I believe that to find such a content would... |
today I went to my Online-Banking by typing in the correct domain name in Firefox. I could login and even see my actual balance.
Then within the site a warning appeared that I should do a test-transfere for security reasons (over 7200€...).
I didn't do this, but was wondering, because I still stayed on the original dom... |
My SSL server uses the following certificate setup: leaf -> intermediate -> root (trusted ca). I have verified using openssl that it's returning both leaf and intermediate certificate (at least I think it does):
$ openssl s_client -showcerts -connect <SSL server endpoint>
depth=2 CN = root-cn - 1537386011
verify retur... |
I want to set up an SBC, e.g. Raspberry Pi, Banana Pi, to work as close as possible to a computer running a Live Distro. I'm intending to use this to inspect suspicious or infected storage drives and view their contents. I'm not necessarily looking to do forensics on them (although if I did, I assume I can just apply t... |
From the way I understand it, at-rest encryption is used to protect data when it's being stored at a datacenter so that if someone manages to get data they shouldn't have, they don't have anything useful. But regardless of what type of encryption is being used, the key (or some other method) also has to be stored somew... |
I'm working on a REST API endpoint where we only accept requests from certain domain names. Whitelisting. A dev I'm working with recommended that we return HTTP 400 instead of HTTP 403 if the incoming IP address is not whitelisted. They said it was because we don't want to disclose any unnecessary information.
Is this ... |
When a binary is running and there is some memory/info leak are there areas of program (or OS?) memory which are more prone to leak and is a leak in one segment worse than in another segment?
|
I found an article from MasterCard's blog stating:
The transport between client applications and Mastercard is secured
using TLS/SSL, which means data are encrypted by default when
transmitted across networks.
In addition to that, some of our services implement end-to-end payload
encryption. For instance, services dea... |
Looking through descriptions of Spectre and Meltdown it seems that speculative execution - the basis for these attacks - occurs only with branched code. Therefore, it seems logical to conclude that having no if statements would preclude speculative execution and consequently, the side-channel attacks. Is this a correct... |
We are looking for a solution to meet the needs of a UK incorporated charity (CIO) that has three to seven trustees from at least three continents.
Obligations as trustees of a board include signing (by a quorum of the trustees):
minutes of trustee meetings and AGMs
annual accounts
decisions and press releases
deeds (... |
Relevant (unanswered) questions I've asked on StackOverflow:
https://stackoverflow.com/questions/70703895/securely-renewing-a-session-without-javascript-and-without-breaking-csrf-protect
https://stackoverflow.com/questions/70713661/is-it-a-security-concern-to-allow-a-client-to-generate-a-csrf-token-at-login-tim
For r... |
Suppose one uploads (carelessly or purposefully) a file with a malicious payload to their Github account (some pdf document, picture, etc.). Could this payload somehow be executed on the Github servers (through preview or alike) and corrupt (infect) any other good files stored there (the years of important work one wou... |
I found a malicious Excel file that was using an embedded HTA program as its dropper to download a powershell program from a malicious IP. The dropper was on a hidden sheet in the file. After reviewing the output in the sandbox I found that the syntax in the command line made use of the ^ character. Why?
C:\Windows\SYS... |
Some browsers like Chromium and recently Edge have a flag to disable JIT. What attacks/threats does this protect against and what JS based attacks are not prevented?
|
I have just installed the most recent version of Kali Linux and I am using john the ripper (version 1.9.0-jumbo) to crack passwords in shadow.
I have followed the following tutorial cracking linux passwords and get the following output.
kali㉿kali$ sudo unshadow /etc/passwd /etc/shadow > ~/Desktop/passcopy
[sudo] passwo... |
So what are the advantages of using SiriKali vs. something like Veracrypt. They both essentially do the same thing correct. I assume Veracrypt would be more secure. What are the differences between the two. I know they use different encryption methods, but wouldn't you just always want to use the one that is more s... |
I can't understand much about packet sniffing operation when it's in a network.
Well, packets are encrypted with PTK to prevent sniffing from monitor mode but when we are in client mode and we connected to a network, we were able to read those packets only using ARP spoofing and Wireshark. The thing that drives me nuts... |
I have used master password to protect my login information in Firefox. Whenever I first start Firefox and open a page requiring authentication information Firefox asks my master password before filling authentication information to the login page.
I recently opened a page (through a link from another page) that is not... |
I am trying to understand why TLS only uses hashing algorithm like SHA-384 instead of using an HMAC instance like HMAC-SHA-384.
If I understand correctly, this cipher suite (ECDHE_ECDSA_WITH_AES_128_GCM_SHA256) means:
It uses Elliptic Curve Diffie-Hellman Ephemeral for Key Exchange in an insecure channel (internet).
I... |
i am trying to decode this data but have no idea where to start. any help would be greatly appreciated
4,2,93eba2404abd4eaca468c828178cf3af,B005,167c5351,16852f43,27c,0,l6VERmVDGmY/YdIbPo5lUODp418=
4,2,2700638c948c41bb9c0a660b97571a3d,B005,167318d7,167bf4c3,27c,0,n3ew0OWbkHW6Pf3CaOwe675cj9o=
4,2,5e5f918faf73473eaaad791... |
We have a Web API which uses the REST semantics and is protected using the Azure's Application Gateway using a Web Application Firewall. The Web App consuming this API can send in any type of data in a JSON format but what is happening is that some strings are triggering the Web Application Firewall's rules for SQL Inj... |
1Starting yesterday windows defender has found and quarantined 5 copies (pic 1) of the following threat (pic2) Exploit:O97M/DDEDownloader.C see here.
I tried contacting Microsoft tech support but they were not helpful at all. The guy just said to let windows defender take care of it and be careful on the internet. Also... |
Scenario: You have one antivirus installed on your phone. You suspect that your phone might have malware on it so you do a system scan and your AV doesn't find anything. So you decide to download another AV to see if it finds something on your system. You install the second AV while you still have the first AV installe... |
I'm new to the company I work in. This company advise me to connect to the internet using a VPN when I work remotely, but also when I work in the office. I've been told it is for security reasons. I am bewildered!
Why is it more secure to do so?
Is there some security issues that might arise?
I've looked around on inte... |
I'm building an application which will support both browser and application access to REST resources.
Applications will POST a username/password JSON body to a login endpoint which will return a signed JWT token in the response body. This token will be stored by the application and included via bearer auth, i.e. Autho... |
In Denmark, the current digital identification/authentication solution for pretty much any online contact with the municipality, state, etc. is being switched over to a setup consisting of the following steps:
You enter your username on the site where you want to log in.
You open the authenticator app (one specific, ... |
Sorry for puzzling terminology, I'm very new to field and it's really hard to me to orient in these new things. (maybe, probably, there isn't 'private key stub' I just saw that term used somewhere, maybe fetch retrieves only public key and we refer to that info, I don't know. Please correct me)
I don't want to private ... |
I am working on an application which has a requirement to send very small messages (<64 bits), asynchronously, and using secure asymmetric encryption. We've experimented with simple RSA + OAEP, and it is workable, but with the caveat that at recommended key sizes it is quite inefficient for our tiny messages.
My unders... |
I'm doing Red Hat (RHEL 6.5) security settings.
If I set up the two files as shown below, is there no security effect on each other?
/etc/pam.d/system-auth
password requisite pam_cracklib.so retry=3 minlen=8 lcredit=-1 ucredit=-1 dcredit=-1 ocredit=-1
/etc/login.defs
PASS_MIN_LEN 5
Is it okay to set the minimum p... |
I need to implement a public REST API that manipulates usernames.
So I have an endpoint that looks like GET http://.../api/users/<username> where username can contain special characters (slashes, percents...) that are URL encoded (e.g. if my username is en/johndoe, my URL becomes http://.../api/users/en%2Fjohndoe).
By ... |
I usually use Veracrypt (and in the past Truecrypt) to secure my external hard drive. I've always been taught to stick to such open-source software for my disk encryption needs, since it can be verified to be doing what it claims and the open-source community can check for possible backdoors.
I recently bought a new ex... |
Take the combination of an encrypted disk with a secure enclave chip that never exposes an internal Key Encryption Key and throttles or prevents too many password guesses.
Seems to me that this should be capable of defeating brute force attacks against relatively short passwords, even if the attacker gains physical acc... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.