instruction stringlengths 24 29.9k |
|---|
I recently came across a vulnerability which was caused by unsafe deserialization (Java) and the use of the Apache Commons library commons-beanutils. The ysoserial project references commons-beanutils 1.9.2, so I thought that there might be a later version with an improvement that breaks the gadget, similar to what was... |
I bought a USB Bluetooth adapter and my PC now has Bluetooth available, but while it's connected it is makes a "HID Keyboard" show up in my "Mouse, keyboard & pen" setting in Windows (which I can remove until I re-plug it again).
Does it mean the device is also a malicious hidden keyboard? Something like a Rubber Ducky... |
Which version of TLS is being used here?
|
I've read that I shouldn't open RDP ports on my router (obviously with port forwarding, I don't mean opening 3389 port directly). Instead I should use something like VNC (I get that solution) or create a VPN connection and then use RDP locally. If a user uses his own device to connect remotely isn't it more susceptible... |
I need to perform a security audit/assessment on 4G LTE hardware equimements :
4G landline wireless phone (not android OS but with many features such as WiFi hotspot)
4G Wifi home router
Is there any standard/guideline/procedure (or any checklist on the subject) that exists that I could use to perform a security asse... |
There is a digital banking app for increasing wallet limits. We can verify our fingerprint with this feature.
My question is, is it safe to use? I mean are they going to store my fingerprint and then perform some verification?
|
Let's say I have a file named foo.sh.jpg or foo.exe.jpg. FastAPI automatically assigns a content-type: image/jpeg in both cases so if you check the MIME type you technically have an image. I wanted to know if by also having a .sh extension it could go undetected (if you only check for MIME type) as a .sh and run itself... |
I am configuring an application server hosted on EC2 instance to send e-mail notifications.
This requires configuring SMTP settings and storing them, including password, in a config file:
gitlab_rails['smtp_address'] = "mail.example.com"
gitlab_rails['smtp_port'] = 587
gitlab_rails['smtp_user_name'] = "username@domain.... |
I want my web server to be as compatible as possible with old clients, even clients without TLSv1.2 and ECDHE support.
What ciphers should be supported for legacy clients, and in what order should they be preferred?
ssl-config.mozilla.org places the ciphers in such order: ECDHE, DHE, non-DHE.
But according to testssl.s... |
I'm monitoring my home network with Wireshark, since I believe my computer is being actively hacked. I looked up a LOT of IP addresses, but didn't find any suspicious ones.
Can a connection be hidden from Wireshark? What evasion techniques do hackers usually employ?
|
I am implementing OAuth (more specifically "Sign in with Google") for a website that has been using only email and password for years.
Now the guide that I'm reading suggests to read the uid in the OAuth callback. However the existing users, that have signed up with other methods, don't have that information in the dat... |
I am currently following the instructions for getting an access token on behalf of a Twilio user described here
The part that is confusing me where it seems to generate an access token then proxy it back to the client. I guess the idea is the access token is being made for the user on behalf of the application but tha... |
I have read RFC 5056, RFC 5929, and RFC 5802.
They say channel binding can prevent MITM attacks in an insecure environment where the client does not or cannot verify the authenticity of the server.
If I understand correctly, the key idea is utilizing the information(channel bindings) derived from the key exchange of th... |
I'm browsing the ATT&CK and I understand the meaning of right-to-left override that it is using non-printing unicode character, but what is the different if I just simply rename a file like this: file.txt.exe in cmd, instead of inserting unicode to make it like this: filetxt.exe, showing the file in the properties betw... |
I am doing one of Portswigger's labs on web security, specifically CORS (cross origin resource sharing). I am having trouble understanding why there is a need for URL encoding certain parts of the XSS payload.
As a brief summary, the lab involves the following actions:
We want access to information that is delivered to... |
So I am testing an application and I almost got an XSS vulnerability but only if I can comment on the rest of the code. e.g. Originally this is how the target returns the user-entered input:
I've been able to get this to this far:
Request
Response
Now when I try to comment on the "});", the comments are escaped as f... |
I want to restrict all USB boot media from my system, except for a certain USB boot drive that I declare secure via a certain key.
Is this possible using UEFI/Secure Boot/TPM? Maybe via TPM? TPM gets a private key and checks if public key on USB boot drive is valid?
It's a Debian Linux system.
|
I´m learning about linux privilege escalation via a writable /etc/passwd file and was wondering how common that actualy is?
Are there any use cases where a regular user might have (or even needs) write access to the /etc/passwd file or is this more of a artificial thing for security courses that is rarely seen in real ... |
I'm pretty sure a lot of you are familiar with the "USB Rubber Ducky", the USB stick that emulates a keyboard. Is there software for Windows that will prevent this type of attack, while still letting me use legitimate keyboards? For example, is there a program that will prompt "Please enter the words you see on the scr... |
I'm looking for a method to check whether DNS over TLS is blocked in my network by my ISP or not. A method that isn't just trial and error of a bunch of popular DoT providers to see which one connects because I need to know for a fact that my ISP is using a block list or well-known DoT providers or they are using a tec... |
Does Wireshark(packet sniffers in general) let you decrypt someone else's https sites, or only your own? For example if the router is hacked can a packet sniffer give the attacker the ability to decrypt every https site you visit from each device connected to the router?
On the site of Wireshark it says that there are ... |
Suppose I want a server to provide some simple, primarily file related functionality and I want to allow access to all users that have a certain public key (server has the private key) and password to the server. It would be a server that few people would know the purpose for (IP would be explicitly shared only with a ... |
What security level of FIPS 140-2 compliance standard would Ansible Vault fall under? Is there a guide or playbook that someone can share? Thank you in advance!
|
I'm not sure if this site is the best option to be asking it, but could not find a better fit.
Imagine I have some services (SSH and RDP, mainly) exposed on my personal desktop, running at my home.
When I'm traveling, I usually login to a VPN my router is running and consume those services. Thus, my router does not exp... |
I have searched and found those posts how to embed exe file to pdf? and https://stackoverflow.com/questions/2941700/can-i-embed-an-exe-payload-in-a-pdf-doc-ppt-or-any-other-file-format, but they are all years ago. I have also found some recent blogs such as https://medium.com/purple-team/embedding-backdoor-into-pdf-fil... |
I am creating a simplified lead and call management system for a friend's small business.
I would like to know the best practices for hardening password storage and verification using PHP 7.4 and MySQL 7.4.30.
I would like something very secure as some of the data I am storing is subject to HIPPA rules for data storage... |
I came across this use case where mobile devices operating in a pull architecture (connecting to an AWS cloud service endpoint) based on some device triggers will request to be unlocked via a TLS connection. The response will just send a signed message containing the password (to generate a password hash) which will on... |
I got this idea of digital diary app and I’m planning to store the user’s info on the cloud. I’m just curious how do social media keep user data safe from unwanted eyes. I personally find it weird if I’d be able to access a user’s journal entries just because I have administrative rights - I don’t want that and neither... |
How do you boot a Linux live image from a CDN using Https as boot protocol?
The reason for netbooting using a CDN would be to start fresh with a non persistent operating system image. Booting fresh via the network should make it harder to persist malware.
|
I've been studying the various cryptographic APIs on Windows, and the flow that Windows goes through when an application creates an SSL connection.
One of the APIs I've come across are the CNG SSL Provider Functions (e.g., SslExportKey, SslImportKey, SslGenerateMasterKey, etc.). Many of these APIs require the caller to... |
We are running user-submitted JavaScript, server-side to be executed within a headless browser that doesn't have a DOM or any child of the window or document or location objects - because these are already removed. Is there a way for plain JavaScript on a fully updated version of WebKit/Chrome can create an HTTP reques... |
Given that commands like ifconfig or ip address don't require root privileges, apps can access information about ip address. If you use ipv4, you are normally behind NAT and apps would get an address in the 192.168... range, which is not very valuable.
But one of the points about ipv6 is the absence of NAT. I imagine t... |
A friend challenged me in a programming question: You have a list of paths, make the paths a multidimensional associative array of paths.
Sample input:
$paths = [
"a/a/a",
"a/a/b",
"a/b/a"
];
Sample output:
array(1) {
["a"]=>
array(2) {
["a"]=>
array(2) {
["a"]=>
string(4) "file"
... |
My browser (Vivaldi) does not send any accept-language or similar headers for my native language.
Its user-agent does not contain my country or preferred language.
My proxy is verified at https://ifconfig.co/json to be in Netherlands and nothing about it hints at it being located in my actual country, which isn't even ... |
As I know, for antiviruses the VRAM is a blindspot, so casual Windows users like me can't do much about it. They have an antivirus, which doesn't even search for malware in VRAM.
What's the answer for this? "Is it very, very rare, so we just ignore it."? Or they can't do anything about it?
|
I have a private proxy running on a cloud server.
I have some users which I would like to allow access.
The typical way of requesting authorization is for the server to return a HTTP 407 response, with a proxy-authenticate header. The client then responds with a proxy-authorization header.
However, everyone in the wor... |
AMD SEV enables creating a trusted encrypted VM where the memory of the whole VM is encrypted using cryptographic keys and features on the CPU and thus not visible to the cloud provider (in theory if there is no collusion between the chip provider, hypervisor and cloud providers).
Since the whole VM RAM is encrypted, ... |
I am pentesting an application. The application exposes a SOAP API, which I have access to, and internally that API makes the following call:
File.Open("C:\Resources\"+resName+".res", FileMode.Open)
The contents of that file is then returned to me. I'm trying to exploit this to read any file on the server.
I can contr... |
According to docs:
To hash a new passphrase for storage, set salt to a string consisting of [a prefix plus] a sequence of randomly chosen characters ...
and
In all cases, the random characters should be chosen from the alphabet ./0-9A-Za-z.
Reference
Why so?
Also, why the length of that random character sequence is... |
According to this ietf doc there are two vulnerabilities to samesite cookies:
Attackers can still pop up new windows or trigger top-level
navigations in order to create a "same-site" request (as
described in section 2.1), which is only a speedbump along the
road to exploitation.
Features like <link rel='prerender'> ... |
A result of a recent pentest suggested that the HTTP Cache-Control Header max-age=0 should be set when no-store is set.
As I understand cache control, no-store is the strictest we can set; the page should not even land in cache, let alone need to be revalidated. So why would setting max-age=0, i.e. that the content is ... |
I want to block some ports access to the internet but still allow internal hosts to access the port with firewalld. There is another firewall between the internet and the host but I want to add a firewall on the host too.
Do I block the ports incoming and then add a whitelist rule to allow ports for the internal CIDR? ... |
Steps I follow:
I protected a PDF with a long password (I am trying with 38 characters password).
I created a dictionary that contains the password to crack the PDF with John the Ripper.
I run john --wordlist=mydictionary.txt pdfhash.txt and John is unable to crack the password.
This only happens with long passwords,... |
My understanding is that a ransomware uses the target computer's resources to encrypt files. So does that mean that the key used for encryption resides on the target computer for at least some time? I am assuming that symmetric encryption is used to encrypt.
Are asymmetric encryption methods also used in ransomware att... |
Are there good ways to put guardrails on not logging sensitive information? For example, passwords
If there isn't a guardrails approach, is there a way to help make the easy thing the right thing like create a logging library wrapper that filters out passwords and whatever other data you deem should be omitted from log... |
Recently, I started to wonder if OpenID Connect is really secure enough. I have analyzed tons of different sites and official documentation and so far I don't see any problems except that stealing user sessions from one client can lead an attacker to gain access to all clients that the user is logged on to. I am not ab... |
I use an encrypted DNS server that supports DNSSEC and DoH, these features are useful for hiding from the ISP, VPN server provider etc. which website you are trying to look up, but eventually those parties will know which website you looked up and are visiting because in the end it all comes down to IP addresses becaus... |
While reviewing Root CA certificates in Windows Trusted Root CA Store I came across a stange Root CA certificate with Issuer Desktop-XXXXXXX and Subject Desktop-XXXXXXX, enhanced key usage for server authentication and validity of bit less than 1000 years.
I wonder if anyone has seen such kind of Root CA certificate.
I... |
While enumerating a DNS server for a HTB machine, I've tried finding a domain name for 127.0.0.1:
┌──(kali㉿kali)-[~]
└─$ dig -x 127.0.0.1 @10.10.11.166
; <<>> DiG 9.18.1-1-Debian <<>> -x 127.0.0.1 @10.10.11.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 49357
;; flags: ... |
Excuse me in advance since I'm new to this. From what I understand, when the client receive the server certificate, client would verify the cert/ cert chain against its trust list. It would follow the chain to verify if any of the intermediate or root is in the trust list.
What would happen if all the intermediates nev... |
Using GPG, I have created a key pair. I clicked on "Protect the generated key with a passphrase". I have created a .asc file to backup this key pair. Is it safe to publish this .asc file in an unsecure shared file storage, as long as I don't tell anyone the passphrase? As in, could someone somehow extract my secret key... |
I was was inspecting elements in a website and I randomly stumbled onto this piece of code .
</style><meta name="add-styles-here"/><meta name="add-scripts-here"/></head><body><kbn-csp data="{"strictCsp":false}">
Question : is there a chance to inject malicious code inside the data field ?
|
What is the probability that an AES encrypted file, using a wrong password, gets decrypted to something different than the plaintext, but which could still be likely to be interpreted an the true plaintext by the attacker? Example:
John Doe encrypts a TXT file which only contains the following sentence: "Tomorrow we a... |
(I had checked the similar topics this/this/this/this, but I couldn't find the exact scenario or example)
Let's say I have a websocket server (MITM and XSS attacks are not in scope) where inside 'open' event, I check if user has authorization/permissions, and if not, I close the connection. Otherwise, server proceeds t... |
What is the risk if just full name and passport number were to be leaked? just those two pieces of information and nothing else.
|
I have a JBoss application running on openjdk version "1.8.0_212" where I can influence the security settings via the java.security file. However, using this line:
jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH keySize < 2048, EC keySize < 224, 3DES_EDE_CBC, anon, NULL
the server still allows DH 1024 as sho... |
As we know, instructions are stored in RAM. So, can I embed a controller chip (or something like this) that can change the content of RAM? (e.g. change the Windows 10 boot instructions into malicious instructions.)
Is it possible?
How difficult is this work?
I'm sorry if it sounds stupid, because I'm not familiar with ... |
First, I can update this with the affected domain, if it's critical, but for obvious reasons I'd like not to be the target of more problems.
Someone registered some CAA records for my domain.
I have full control of all related accounts: Registrar, CDN, and an AWS account with Route 53 records. MX records with le popul... |
I was reading on race conditions when I encountered the paragraph below:
How exactly does trying to read a non-existing file cause a security vulnerability?
|
I'm looking for a way to find out which certificates, whether machine level or user level, came preinstalled with Windows (when using official Microsoft ISO file to clean install the OS) and which certificates were installed afterwards, by 3rd party applications like AVs, administrator etc.
looking at the certificate s... |
Can websites, server-side apps such as those that rely on a constant connection with server e.g. messaging apps, server-side online games such as those that rely on constant server connection for player movement, inventory data etc. tell that I used MitM on my own computer (client) to view their HTTPS traffic and then ... |
Here's the deal. This might probably be a known best practice, but I haven't been able to find anything on the matter.
Suppose company X has a public facing web API server, and a public OAuth Identity Server. Its clients will get a token from the OAuth Identity Server with various scopes and claims, according to what t... |
Some Vietnamese refugee families have been Bitcoin defrauded by someone using an 805 text number. Lookups say it belongs to a party in Tennessee. I want to know if it is possible that scammers in Asia, for example, could use that number to commit the fraud without the Tennessee party knowing about it.
|
I have told my users for years not to ever click on PDF Documents if they are not 100% sure they know where it came from as they can sometimes be the delivery vector for malicious code.
Recently, one of my users sent me a screenshot of an obvious scam email. They then proceeded to send me a screenshot of the PDF. I th... |
I am trying to judge the security of a web app and I have the sample output below from nmap. But I'm not really sure how to properly interpret it.
Is it merely a printout of all the CVEs for this version of Apache2 (cpe:/a:apache:http_server:2.4.41).
OR does it list only the vulns that are applicable and exploitable on... |
I generated the public and private key with
openssl req -x509 -nodes -days 365 -newkey rsa:4096 -keyout server_key.pem -out cert.pem
and I am using c sockets for the server and client with openssl, every thing works fine and I can capture the encrypted traffic using
sudo tcpdump -w - -U -i eth0 -v 'port 1337' | tee p... |
Is it considered a bad practice to use a secret method to encode data in steganography? We all know that it is a bad practice in cryptography, for at least two reasons:
A public method can be checked by experts so we know it's safe
A secret method is difficult to redesign in case it becomes known
But what about stega... |
I received the following email today which got caught by my spam filters.
<My username>
https://www.google.com/search?q= <my email address>
Rock_jim
Clearly this is spam, but I have no idea what the purpose is. Normally I would expect a link to redirect to a harmful website, but this looks perfectly benign to me. Wha... |
I recently bought a Volcano Hybrid from Storz & Bickel. It has Bluetooth functionality, and indeed requires it to change certain important settings, such as the brightness of the display (which is insanely bright by default).
So I bought a "Bluetooth adapter" for my computer which plugs in via USB. Then I am able to lo... |
How do you create a private-key/public-key pair without the public key's information in the private key? So you should basically not be able to extract the public key from the private key. The private key should contain the bare minimum.
If yes, is this possible in Javascript using openpgp?
|
There are anti-cheat software for Windows that run with really high privileges in order to detect cheats on the users' machine. These anti-cheat claim to run 'on kernel' and scan the user files and memory to detect software that could be interacting with the game (e.g. cheats/hacks).
Recently, I found that some of thos... |
As I got from my preliminary research, there is an established standard TCG Opal 2.0 which defines in specification the principles of SED encryption thus enabling the interoperability between vendors.
Upon reading the specification my understanding was that it covers only block storage devices (LBA) and does not cover ... |
The use-case is as follows:
There is a signer that have a claim or document D who wants any client to be able to verify that D has not been tampered with.
I suppose one way to do this is to use assymetric encryption where: E = encrypt(D, K_priv), using his private key K_priv.
Then any client who get access to the publi... |
Rootless podman, by proxy of the Linux Kernel, has restrictions against ping,
It is most likely necessary to enable unprivileged pings on the host.
Why do unprivileged pings need to be enabled? And what is the detriment to be able to send a ping packet?
|
Where the custom origin server for an AWS CloudFront distribution is an EC2 instance accessible with a public DNS record, do CloudFront edge locations talk to it over the open Internet — as opposed to AWS-only network?
If they use AWS-only networks to talk to origins, then I would dispense with installing HTTPS on the ... |
I have an application that retrieves data from other IoT devices (think in my home, or personal health devices for monitoring). How can I make sure that the data my application receives comes from the devices I trust? In other words, I want to make sure that attackers cannot present false data to my application.
The me... |
I was reading the OAuth protocol docs https://datatracker.ietf.org/doc/html/rfc6749#section-6 where it implies that you don't need a client_id and client_secret to refresh an access token, just a grant_type and the refresh token.
I was of the believe that in a situation where your refresh token is compromised, an attac... |
I want to use jwt tokens that are validated on my servers and for storing the token I am spliting the token into 2 parts the signature and the payload the signature is stored in an httponly samesite cookie with crsf protection and the payload is stored in workers ( I just read this somewhere randomly if it is not a goo... |
I'm conducting tests using hashcat and find it very difficult if the hash is encoded.
See the below function which takes the plain text, converts that to the bytes, creates the SHA512 hash and then encode to string.
static string GetSHA512Hash(string message)
{
using (var sha512 = SHA512.Create())
{... |
Are libraries inherently more vulnerable than in-house application code?
The speaker of this talk generally advises folks against creating wrapper libraries for Erlang in Elixir rather than just writing the code in Erlang. One of the reasons he gives is vulnerabilities and I'm not sure I follow.
Say you have some code ... |
What is a suggested way to:
Encrypt a file
Put file on USB
Give USB to a 3rd party who is not that tech savvy
Someday in the future, somehow provide them with the password
Ensure that if #4 happens a long from now, the 3rd party will still be able to decrypt the file
It’s just a couple of files. Fine to encrypt files... |
At a high level based on the technology of event store and streaming (i.e. Apache Kafka, Amazon Kinesis, etc.) to decouple systems and make them event driven systems. I was wondering what new architectural risks this would pose such as whether there is more susceptible to abusing blind trust between systems like the ev... |
When I want to use encrypted request object with OpenID Connect then my OIDC provider must know my client_secret (used in JWT request object encryption). For the server to decrypt this object, that is, it has to store unencrypted client_secret in the database. This seems quite dangerous, is there any way out of this pr... |
I am trying to use snort to detect unauthorized HTTP access (wrong credentials or a HTTP status 401 code) by creating snort rules, I tried different combinations of snort options, but none of them fired an alert, here are the rules that I tried:
alert tcp $HOME_NET any <> !$HOME_NET any ( msg:"Possible bruteforce atta... |
Given
Final X.509 certificate A in PEM format.
Access to the certificate store of the server, which encloses all certificates, including singing chain for the certificate A.
OpenSSL shows following attributes of the certificate:
openssl x509 -in second.der -inform DER -text
Certificate:
Data:
Version: 3 (... |
I understand how Key Usage Extension of x.509 certificate works. I have gone through the Key Usage section of RFC5280 and I know of all the valid values and what they mean.
But what I don't understand is the usage; Why it was deem necessary to add Key Usage extension to x.509 certificate? Is it solving any problem or i... |
I have one Spring boot Web application which has few apis facing internet, deployed on aws, they work on JWT token, they're fairly secure. But there are few apis that work on static token validation. They are used for asynchronous operation such as sending emails from lambda etc. These type of apis seems to be somewhat... |
Is fTPM more secure than a real TPM module when using Bitlocker?
As far as I know, you should enable pre-boot authentication if you use a TPM module that is plugged separately onto the motherboard to prevent possible reading / sniffing of the key from the TPM.
Here and here it is said that it is much more difficult or ... |
I am learning Blind SQLi with Port Swigger Academy but I am stuck on this lab: https://portswigger.net/web-security/sql-injection/blind/lab-conditional-responses.
In this lab I have to get the user 'administrator' password from the table: 'users', columns: 'username','password' using blind SQLi located in a cookie. I c... |
I was testing an application recently and i came across with a Reflected XSS vulnerability via HTTP POST Request with JSON body. Although this condition can't be exploitable from his own, due respond's corresponding MIME type application/json preventing the reflected payload to trigger an XSS. However, this endpoint ... |
Hello I had used this pgp public key on my win10 OS with pgptool to message someone.
Then when i used that same public key in whonix OS console it came back with some type of warning about malicious item that could go into root?
SO i didnt use it and have been trying to find out what it was, if im infected or what. I ... |
I own a Samsung 980 Pro which, according to its own specification, supports Class 0, TCG/Opal 2.0 and IEEE16667. Since it's an NVMe drive, I cannot use hdparm in order to set up class 0 encryption but the UEFI of my Dell Notebook does.
I am aware of the fact that it's important to set the security level to maximum when... |
I'm relatively new to using OWASP ZAP. I tried fuzzing POST requests with Zap and am able to see all the messages sent in the Fuzzer tab.
When I select one of the messages in the Fuzzer tab, I can see the respective Request and Response in the relative tabs.
Now, I can export the Fuzzer results in CSV format from its t... |
Does John the Ripper method take so much time to crack the password? It's been 3 hours since the process started. No output yet and my PC specs are lower than you think.
Hashcat:
Airtel-My WIFI-BMF422-58E4:$WPAPSK$Airtel-My WIFI-BMF422-58E4#k3g06ZXYyCSU66AjYC8Ti4O5HZq0dUZw6JeFlHD/3afwKQH0GV8HVVHlamO6SfXQrrRBlbxcbAJB2XH... |
In April 2022, GitHub suffered an attack involving stolen OAuth tokens:
Security alert stolen oauth user tokens.
Github stolen oauth tokens used in breaches.
Interestingly, GitHub OAuth tokens have a very long expiry -- they expire only if they haven't been used for one year. An alternative described in the OAuth sp... |
I would like to keep some secret executable binaries inside a LUKS partition.
This partition is not mounted automatically at boot, but only manually in some moments
I would like to automatically add a directory /media/user/luksdisk/bin contained in the luks partition to the system PATH automatically after mounted.
I wo... |
This was covered in Linux PrivEsc, task 15, in this TryHackMe room.
I am having trouble understanding how this debugging mode is executing the commands in the PS4 variable, and why I must put /usr/local/bin/suid-env2 instead of another path at the end of the command?
Here is a copy of the room's content:
Note: This wi... |
I am travelling soon, and my country has passed tyrannical laws that allow them to demand passcodes to devices, and I believe that they are increasingly beginning to violate privacy rights.
I would like to protect my privacy. Currently I use iPhone and MacOS devices.
I have enabled FileVault on MacOS. I will update my... |
I am creating a react native mobile application using Expo. This app simply renders information - there is no data collection or entry, no user accounts, no database (other than JSON storage). There is not a single input box in the entire app, it is simply an information portal. The app does, however, link directly to ... |
I'm trying to encrypt a string like this:
echo "hey" | openssl enc -aes-256-cbc-hmac-sha1 -md sha256 -pass pass:foo -base64
But word on the street is that older versions of openssl are not salty enough and can expose your password. The suggestions are to upgrade to openssl 1.1, use GPG, or supply your own key. I don... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.