instruction stringlengths 24 29.9k |
|---|
You may see this question as a logical successor of this post.
With the new Whatsapp Web update it is now usable without keeping the smartphone online. I can't imagine how this is compatible with End-to-End-encryption since the private key for decrypting messages has to be shared with the linked device through Whatsapp... |
This article covers the solution for the LDAP challenges on a capture the flag.
I understand how the first example works, using the NULL value for the username and password to authenticate to the LDAP exploiting NULL Bind. I understood the tutorial and how to do it manually, and I successfully completed the challenge.
... |
Is it possible for an advanced attacker to use a dumb-phone (such as, say, Nokia 105) to spy on its owner through the microphone?
|
I am trying to implement secure file uploads. I need to support various file types, including PDF, XLS, and XSL. I have implemented some basic controls, such as:
Store files outside the web root
Check file extension against whitelist
Generate a new file name on the server
However, I am struggling to validate the file... |
Another question (Is it possible to block non-PyPI requests during pip install?) asked about locking down non-PyPI pip installs for security reasons. This doesn't deal with the problem of malicious packages within PyPI itself. So, I would like to know how to lock down PyPI without interrupting users "too much". I kn... |
When I submit an Customer Reference ID in an Android Application it POSTs an Encrypted String to an API Endpoint.
For example, if I enter the following CR ID :
"CR-13261150"
it POSTs the following Encrypted Data:
splainText : "vpEz/Vm8Yi9v5/fzNE+MDoMIQGZ0vNvjPuX8UNAi26c="
Count : 31
i can say count is based on L... |
Was there ever been out-in-the-wild or any kind of detected firmware rootkit in an M.2 SSD?
|
CPUID is an instruction that identifies CPU type and features.
Has there ever been a case of either targeting or the opposite - ignoring of specific CPUIDs by malware in the wild?
|
We are trying to convince folks in our company to grant developers full privileges to all services in "dev" account (current policy does not allow developers to create anything in our AWS account, because "security").
Folks say we might grant you full privileges to certain services e.g. S3, but some services (specific... |
Rewriting for clarity:
This is regarding emails send from a 3rd party marketer spoofing one of our email addresses in the message header from field. In these emails the envelope sender would come from "noreply@marketingfirm.example", but the message header from field would show "marketing@mycompany.example". Normally... |
Please assume the following in responding:
Data being passed to vendor is subject to data protection laws in the USA such as GLBA
Data itself resides within the United States
Switching vendors will be difficult due to tight integration with preexisting company products
A mature cybersecurity program is in place at ... |
In my original question from 2020, I was unsuccessful in my effort to setup Cloudflare's (link to docs) DNS over TLS (DoT) (link to wiki) in my old, and now decomissioned, router:
Does Cloudflare's DNS over TLS (DoT) implement DNSSEC too?
Now, having more spare money, I have bought Turris Omnia 2020 router (link to sp... |
When I type in PowerShell
ping security.stackexchange.com
...it gives me the following:
Pinging security.stackexchange.com [151.101.193.69]
And as far as I understand, this IP address corresponds to domain name security.stackexchange.com . But then I try to connect to the website using IP, it cannot establish connectio... |
Is it acceptable to store a client cert's private key as exportable in the computer's certificate store?
I have a .NET desktop app that installs client certificates in local machine\personal. The certificates are generated by a protected API. The certs are used to authenticate service calls by another .NET desktop appl... |
I’ve seen multiple sources online that say that unlock patterns are less safe than ‘random’ PINs.
I was thinking; how come?
From what I see, they would both be just as secure; you chose different points on a grid, in a certain order, and then it’ll unlock your phone. They just seem different visually.
I also understand... |
Following this question (Why do we need IDS/IPS if a firewall is present?) from a few years back, I am trying to take this subject to the cloud.
Assuming that I have a fully "serverless" AWS environment consisting only of Lambdas and Fargate based ECS containers running HTTPS services, what benefit would I get from ins... |
We have a Windows Server 2016 that we use as a web server hosted on premise and we host numerous web applications under the Default Web Site in IIS. All applications are reached by using the server name, only. There are no fully qualified domain names. I want to use an SSL certificate. I went to the Default Web Site bi... |
I'm trying to establish a TLS client-server connection with openssl 1.0.1x on ubuntu-14.04 in order to create a fix for CVE-2015-0205 for learning purposes.
I found this explanation of CVE-2015-0205:
An OpenSSL server will accept a DH certificate for client
authentication without the certificate verify message. This
e... |
I am comparing the performance of the ECDSAP256 signature algorithm and RSA3072 on OpenSSL.
I first used openssl speed to test algorithm performance:
RSA3072 signs 356.2 time/second and verify 17625.1 time/second;
ECDSAP256 signs 28096.7 time/second and verify 9462.5 time/second;
Then I created a server with a P256... |
Inspired by a discussion elsewhere, I've been wondering if the concept of a "trusted device" is considered a factor - on it's own - in multi-factor authentication?
Given context is that a mobile application has signed on to a service that requires authentication. The service will, after login, trust the device from thi... |
You create an account on an online service X with login=your email + password. Compare these 2 situations:
No 2FA enabled. The only risk is if your email is compromised: the "I lost my password" feature can be used, and then the account on service X is also compromised.
2FA enabled with SMS or another second factor. ... |
For context: in Sweden, the "end" of COVID has caused a huge buildup in passport applications, as everybody wants to resume travelling. However, due to the poor performance and general UX of the national Police website, it is very difficult to find a time for application. Thus, a trend seems to have arisen of "script-k... |
Do WAFs block/trigger alerts when they just read base64/hex encoded stuff as suspicious input? Or do they decode the strings (the ones which can do that), analyze the result and just then evetually block/trigger some alerts?
|
I am responsible (among many other things) for managing TLS/SSL certificates for a couple dozen or so websites for a large multinational. Some sites are hosted on Apache, some are on IIS. I use openssl to generate private keys and csr; once certificates are issued by the certificate authority, if necessary, I convert t... |
Given that Same Origin Policy prevents JavaScript from one origin from running in another origin and accessing another origin's cookies, why is CSP necessary?
Is it that CORS selectively removes some protections of SOP, and CSP is an attempt to add some of those protections back? I think I have a fundamental misunderst... |
My webapp takes in email addresses as user names at registration, verifies ownership by sending emails with confirmation links, etc.
I'm now looking for a secure design of a user deletion feature, such that despite the account being deleted, the system knows when somebody registers again under the same email address. A... |
I just wrote and compiled a Hello World program in C# (I'm using Visual Studio 2022) and when I sent the file to VirusTotal, 1 antivirus program detected the exe as unsafe (VirusTotal results of C# Hello World Program). When I rewrote the same program in C++ and sent it to VirusTotal, 4 antivirus programs detected viru... |
I want to know if there was any vulnerability discovered - whether known to be exploited or not - in cryptographic systems due to improper use of the underlying block-based encryption algorithm's mode of operation. My question is not limited to AES or any specific cipher. Also I am not interested in academic-only vulne... |
I have set adkim=s and aspf=s, the DMARC check on mxtoolbox.com passes all tests. However, I'm using the default DKIM from microsoft, so from my understanding DMARC should fail since the alignment check with DKIM should fail. However, it passes:
Authentication-Results: mx.google.com;
dkim=pass header.i=@examplecom.o... |
There are files I need from a heavy NAS user and they've given me a link of the form http://gofile.me/xxxxx/xxxxxxxxx If my laptop running the Chrome browser in macOS is connected to the internet via an iPhone hotspot and I download the data, what information about myself and my equipment is available to the NAS owner?... |
I am trying to understand OAuth2 and OIDC. The OIDC glossary is a good starting point, and while it defines "Authentication", but does not actually define "Authorization". I suspect it leaves to the OAuth2 specification to define the term. I cannot, however, find any definition in the RFC. Where is the official de... |
We want to decrypt websocket traffic to analyse the used protocol. The traffic is between a pc-system (windows) and an embedded system. All certificates are available with private keys and everything is set up in a laboratory environment.
When I capture the traffic with Wireshark I can see the key exchange and the ciph... |
I've been sent a certificate of compliance with PCI DSS (v. 3.2.1) in the form of a PDF. In it company A (issuer) claims that company B passed a formal assessment and is a level 2 merchant.
What options do I have to be more or less convinced that it was not just mocked up by the company and has actual merit?
|
CVE-2022-22720 (Apache HTTP Server 2.4.52 vulnerability) mentions that the risk is with HTTP Request Smuggling.
My understanding of HTTP Request Smuggling is that a front server A transmits to a back server B a request. That request can be "enriched" with extra contact that gets interpreted by server B.
I see how this ... |
I was just catching up on best practices for securely erasing data from a Mac. At one point I remember reading:
For SSD drives it is no longer recommended to fully write ones/zeroes/random bits on the disk. Use encryption instead.
Now, I am thinking of two starting points:
Your disk was not encrypted
Your disk was enc... |
Is it normal for a physical VPN service to generate/compile the exe for the VPN client? I don't know that much about VPNs, so this might be normal - but a client uses Sophos VPN, and they're saying they want to email me an exe to install for the VPN client. I've asked if I can download the client directly from Sophos's... |
Given some strong cipher (like TLS uses), what can be deduced from its ciphertext? For example, is the length of the ciphertext the same as original text? Are spaces preserved? Or some letter frequencies? Or the number of distinct characters?
|
TLDR Mac OS_X 10.11 / openssl 0.9.8zh connects successfully using TLS1.0 to a modern server's SMTPS port, but not its IMAPS port, despite the use of the same SSL library on both server and client. Any idea what this could be?
Debugging detail:
Having recently upgraded my Ubuntu mail server, one old client (Mac OS-X 10... |
We have a fair amount of email traffic. Recently, we had some suspicious email spoofing attacks and a lot of users reported that outgoing emails were marked as spam and landed in junk folder (reported by mail recipients). When we checked our mail reputation on talosintelligence.com, I found something interesting that I... |
I'm using macOS High Sierra, and mac Mail version 11.3. I have a script that uses the Twitter API to continually fetch tweets in real-time and send the contents of each of these tweets, including any images, to myself in an html-formatted email (such that any images would be embedded in an <img> tag).
If I read all of ... |
We have a game that is built on the client side. People who get past a certain level are eligible to enter a raffle. This is done by sending a request to an endpoint from the client once they get past level N. But this is prone to someone figuring out this call from the network tab, and programatically sending the requ... |
If I had a specific USB and I plugged it into one computer to download something and then plugged it into another computer to download more files/view the files/etc., would there be some kind of record that it was that specific USB plugged into both computers? If someone really wanted to know where that USB has gone, c... |
I need to secure logs on a IoT device (Infineon TC233). It has 2 MB flash and a HSM. We are at the design stage of development.
Since logs will be primarily event & data logs, the size of the log file is likely to be in a few KBs. Additionally, logs will be dynamic files where event logs keep getting appended.
Logs on ... |
Since the beginning of the Ukraine-Russian war, a new kind of software was created, which is called "protestware".
In the best case, the devs only add some (personal) statements about the war or uncensored information to the repositories or when starting the application. Since Github and other platforms are not banned ... |
I'm doing a manual install on Linux of the .NET runtime which can be downloaded from dotnet.microsoft.com.
MS do provide a SHA512 checksum of the file on the site, but that can't be use to verify the sincerity of the file.
So am I missing something or does MS really not provide any way to verify that the file hasn't be... |
I'm guessing uploading to IPFS also uploads some metadata, which gets shared as well, does this assumption hold any truth? According to this only content identifiers and node identifiers are in the public.
Does uploading a file leak any of your PII?
Does it leak the uploader's IP or is it dependant on how the file was... |
I am having trouble to understand how a TLS certificate is authenticated.
From what I read, a server's leaf certificate contains:
Server domain name
Server public key
Issuer (CA) domain name
Issuer (CA) signature of this certificate
How is the issuer signature of the certificate verified? Is it a hash function using ... |
I am looking for what CIS defines as each of the Asset Types. They have each of the asset types within the glossaries of their documents (Controls, Risk Assessment Methodology, Community Defence Profile) but i havent been able to see what they specifically mean by 'Data'. Even within their Privacy Guide. It is just ... |
Most corporations have a forward proxy to channel all traffic from devices on the intranet to the internet, for various security reasons.
When the device is on the internet, I suppose the proxy is not used. Does the browser "try" to connect to proxy configured in the browser, if it can't connect it bypasses the proxy &... |
I've recently set up a mitmproxy on my phone and it seems to work fine. It intercepts that request for https websites and I can view their content.
But I'm trying to intercept data from a banking app I have on my phone. The connection works perfectly fine and I can see all of the requests that get sent from my phone on... |
I am solving PortSwigger's lab: "CSRF where token is tied to non-session cookie". For testing SameSite attribute I created a cookie in my browser with SameSite=Strict for domain https://<id>.web-security-academy.net/.
Then on https://exploit-<id>.web-security-academy.net/exploit I hosted the exploit with the payload:
... |
I'm trying to create a private CA and want it to only be able to issue certificates for my domain via name constraints.
However, even if I create the CA with restrictions on DNS names as well as directory names like this
New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My\ -Type Custom -KeyUsage CertSign,... |
Microsoft introduced a new security chip dubbed Pluton that is ought to become mandatory for systems running Windows (11 and forward).
AMD has already implemented or is about to implement the chip as part of the Ryzen processors
It has also been mentioned that Pluton builds upon TPM 2.0. There is a detailled spcificati... |
I was wondering if Google can see my computer screen while I'm using Chrome Remote Desktop.
Let's assume there's my main PC named A and my other PC named B.
PC B will have the Chrome extension installed and is the PC that will be accessed remotely.
I use Chrome Remote Desktop to access PC B from PC A.
I log in to a VMw... |
Imagine the following scenario: A company network with "domain joined" linux clients (e.g they have a HOST$@DOMAIN.LOCAL principal in their keytabs file + A computer entry in the DC).
Now an attacker gains access to this network with his laptop (where he obviously has root privileges), he issues a kinit <valid_company_... |
I have an internet-facing RDP server and getting constant brute force attacks trying random usernames and passwords. It's Windows 2016 with remote desktop services enabled. What can I do to stop this attack and secure it properly?
Edit: I have users connecting from all over the world so can't use VPN for everyone nor r... |
I have recently started creating an online Tetris type of game, and I was wondering what amount of security I should implement for an online match. I am in a conflict where I want to make my game as secure as possible, but if someone were to try very hard, they could probably cheat in the game. For example when someone... |
Hashcat uses Markov chains by default when using brute force mode. Do they really speed up the cracking since a randomly generated password normally has the same probability for every combination?
|
It's common knowledge that one shouldn't login to personal or bank accounts on public wifi such as in a starbucks or a hotel. However, assuming that the connection is HTTPS and the passwords itself are encrypted, how is it not secure? Because if the connection is https, then even your ISP can't see exactly what the web... |
Is it possible to set up Windows in a way that plugging in external storage can't compromise the device/network?
To clarify, I would like to use the storage device to transfer data into the network. My concern is the threat of the device itself, not the files on the storage device.
|
I read a similar question here on how large companies protect themselves and became intrigued about how this would transfer over to less significant operation (ie security researcher, small company, etc).
I recognize that malware analysis should not be done on machines with information of value, and that realistically,... |
Hypothetical scenario:
An organisation with users who rely on the service's zero knowledge cryptography has a vulnerability disclosure made to it from a research institution.
There are multiple vulnerabilities in the disclosure with medium-high impact to the users of the service and also various sensible recommendati... |
Hey so am new to pentesting and I learnt that using https makes the traffic encrypted so hackers cannot decipher credentials passed in a body for example in a login page or read the traffic properly. So I was practicing with both GET and POST requests for a login page app over https and in both the credentials are pres... |
I have an SQL Injection in an update SQL query that is run against an SQLite database in it's default configuration. The query itself is somewhat similar to the following:
"UPDATE user SET active = 1 WHERE name = " + attacker_supplied_string
Although I initially assumed it'll be doable, I now face the fact that due to... |
Is there a workaround to the Windows 10 Hello PIN security login policy?
The PIN is the only credential needed to log in, no password is set, checked with samdump2.
I inherited this computer from a recently deceased family member, Microsoft refuses to send us the credentials for privacy reasons.
I dual-booted a Debian ... |
I read this article at Electronic Frontier Foundation on how Russian government wants the residents there to install a specific "Trusted Root CA" certificate. According to the article, this certificate has can inspect the users traffic.
It made me think about the various trusted root CAs that are currently installed on... |
I am getting the notification 'Cannot verify server identity' for every single website I try to open on an iPhone. This, however, only happens when connected to a certain WLAN.
On mobile internet this does not show up.
I already have reason to distrust this WLAN. Is this, however, credible evidence that a man-in-the-mi... |
Are there any other projects similar to what SCAP Security Guide (SSG) is doing? Automated security policy compliance using Ansible playbooks and Bash scripts.
I'm trying to put my systems in compliance with CIS and STIG, but CIS only provide PDFs with the policies and no automated content, and SSG doesn't have the STI... |
Is there a way to see the URL/IPs that are hard-coded in an exe or dll without installing or running it?
I once saw a tool that extracted URLs from dll or exes, but I can't remember what it was.
|
Sometimes there's no tar release for some repo in github, and the download as zip button only generates a random zip with random hash. So, in my Dockerfile, I want to clone a repo but be able to check against some hash to prevent tampering.
If I do
git clone https://github.com/repo/repo && git checkout hash
then can I... |
While comparing Kaspersky Total Security (KST) with Kaspersky Internet Security (KIS). One of the "extras" of KTS is the added "feature" of "Data Vaults", which "encrypts with AES256 with an effective key-length of 56bits". Obviously AES is defined for 256bits but somehow the entropy going into the key is reduced (e.g.... |
To show something in a forum you capture a page of an email service after logging in; but using MS Paint you erase the titles of the inbox as well as your name. Only the following information is shown
company name
the layout of the mailbox (its overall design) and their respective names
(maybe) the URL post login
Can... |
I can't quite imagine a scenario where fingerprints can be stored in a way that defeats the weaknesses of password storage (i.e. pass the hash attacks or password reuse). Moreover, I couldn't quite find a concise explanation of the way Windows Hello stores and compares fingerprint hashes, so I'm wondering how exactly t... |
I have a Yubikey 5 Series and would like to use it to encrypt a file, so that a physical presence of my Yubikey would be required to decrypt it.
I know you can save a PGP key onto Yubikey and use it for this purpose. However, I am planning to use the PGP encryption key for something different and would like to narrow t... |
I have a lot of binary files that contain some data that is signed using CMS.
The files have the form:
$ openssl cms -inform DER -in test.cms -cmsout -print
CMS_ContentInfo:
contentType: pkcs7-signedData (1.2.840.113549.1.7.2)
d.signedData:
version: 3
digestAlgorithms:
algorithm: sha256 (2.16.840.... |
I am trying to better understand measures that can be used to protect a web-application. I'm trying to determine which would be more effective, implementing a UFW or using IpTables.
From my perspective, they are both as effective as each other but the effectiveness of them is not based on the tools themselves but rathe... |
I recently encountered software that requires me to put my password followed by a TOTP token into a single entry field. (Similar as to what is depicted in this question).
While it can be debated whether this is a bad design choice (e.g. a separate entry field for the OTP would be self-explanatory) my actual question is... |
So, we've got a ROS application running on a robot, which is going to be distributed to potential partners/customers. The code on the robot's computer will be compiled, but we want to add extra layers of security so that people wouldn't have as easy a time getting inside (to read/decompile/reverse-enginner it) and to t... |
I've noticed I can't take screenshots of videos in Star+. When I paste whatever I tried to shot, it comes all black (subtitles however are visible). After some research, I found out it happens with other streaming services as well. It looks like some DRM technology to avoid copyright infringement.
Since the video is pr... |
So I was testing my application for some vulerabilities and found one that I missed:
<input class="hidden" type="hidden" name="event_id" value="{{$event->id)}}">
this puts the ID of the current event during the checkout into the database. Of course this would allow a malicious user to change its value and change the b... |
Keep in mind that I am not a security specialist or a networking specialist. I am a software developer dealing with this kind of software for the first time.
Our software is used to control user session on Windows computers. Users are assigned a workstation and get to use it for a finite period of time. Our software en... |
I am connecting to a HTTPS service with SSL through a HTTP (not HTTPS) proxy.
I am using Chrome/Firefox proxy settings. (Chrome does not directly expose them, but it can be set via chrome extension or by command line argument. Firefox exposes that in settings.)
I keep wondering, what can "evil" HTTP proxy do? What does... |
I hope this question is on-topic:
Learning about the eNULL "encryption" and the related warning, I wanted to list all ciphers than include eNULL:
~> openssl ciphers -v eNULL
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD
TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20... |
When trying to analyze malware, have there been cases where malware detected the use of mitmproxy and ceased operation?
If that has happened, would it be a good idea to be constantly using a proxy as a measure for deterring any malware?
|
We have our own root certificate authority which is used to sign the certificates for the agents connected to our server. We have generated the root certificate authority using keytool command as below
Keytool -genkeypair -alias endpoint -keyalg RSA -keysize 2048 -sigalg SHA256WITHRSA -validity 10950 -keypass KeyVontuS... |
What exactly can someone do if they know your Wifi password? Can they only see which sites you visit or can they do more? Are they able to hack(router) and do malicious things with your router just by knowing the password?
Is it possible to send a virus through the wifi to the router?
Also can a hacker tell what kind o... |
I have an apache server with ModSecurity. I need to block all IPs except for a few ones.
The list of IPs is like this:
194.83.128.0/21
191.143.32.0/19
145.126.72.0/21
101.28.248.0/22
40.64.64.0/22
180.11.124.0/22
190.230.64.0/18
109.154.0.0/16
42.60.0.0/16
43.223.0.0/16
2a03:e980::/29
Right now I applied this rule:
Se... |
I read this: https://duo.com/decipher/malicious-chrome-extension-backdoor-uncovered-in-malware-campaign#:~:text=One%20of%20these%20is%20a,system%20and%20installing%20the%20extension. I quote this part from that article:
The browser extension, which includes samples dating back to August
2018, is delivered via an execu... |
How does the HAVEGE method (or rather, the specific adaption of it as used in haveged) for generating randomness from timing differ from that of the Jitter Entropy method? Is there any research showing any major difference between their ability to extract quasi-non-deterministic randomness from CPUs? The former is a b... |
Suppose I have a software which I sell to customer to use. I want to include a license that will be expired in let's say 1 year, so that customer need to renew their package.
I want to prevent the user (customer) from trying to bypass the expiration, so I decide to use a digital signature to protect the expiration date... |
We are using IIS on Windows 2012-R2 server to host dotnet apps. From the app, when we try connecting to an external 3rd party api we see TLS handshake failure. On running ssllabs test on that api, I see that they support only below suites.
.
On microsoft site I can see that our windows os version only supports some ci... |
Assuming that I can delete arbitrary files on a linux system as a non-privileged user, what methods exist to escalate my privileges this way?
|
I am thinking of using GPG to sign commits and particularly to secure emails, and have some questions regarding its usefulness.
Basic threat model
The data in transit may not be secure if the recipient isn't using a large email service provider like Google's Gmail and the like. But that may be rare these days.
Most em... |
I interact with some API's that use PKA and I'm looking for the safest / best-practice way to store my secret key. The approaches I know are for example:
Create a 0500 access directory on my server
Within that directory, store the file containing the secret key in plain text as a 0400 access file
Access and use the ke... |
Is it possible to create a backdoor without configuring an IP? For example, if I want to create a listener that everyone can access, what can I do? Something like a backdoor, RAT or something like that?
|
This is a 2-part question.
When GnuPG is used externally in Thunderbird 91.7.x, i tested email encryption from Account A to Account A, the message was received perfectly encrypted and in the "Message Security - OpenPGP" view pane of the message, it shows the keys that the message was encrypted with. In my case now it s... |
My colleagues and I are developing a public web application with client and admin access.
I'm concerned about security, being the application public. I would like to add every layer, as long as it's useful and really provides security.
I thought that preventing the client access being the same as the admin access, woul... |
How do I generate SSH keys inside my yubikey, on Ubuntu?
There seems to be nowhere to look for this info.
|
I have a postfix mail server that accepts these cipher suites:
tls_high_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:
DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
I notic... |
How do I acquire the means to prove in the future that I had possission of a
file now, without relying on the integrity of a single entity? (I believe one
way of doing it would be to put the file through SHA1, and send a minimal
amount of Ether (0.001) to the resulting Ethereum address (both SHA1 hashes and
Ethereum a... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.