instruction stringlengths 24 29.9k |
|---|
I understand that there are many security issues associated with Bluetooth's "discoverable" mode, and have avoided it where I can. However new features of many systems (e.g. Apple's Handoff/Continuity) rely on having Bluetooth's "advertising" mode always on.
Is Bluetooth's "advertising" mode more secure than "discovera... |
Our company has made the decision to switch from an internally hosted Jabber-based chat system to a more modern, cloud-based chat solution. Hosting our own chat servers and software presented the standard maintenance and issues that tend to come with any self-hosted stack but the system did work and generated few compl... |
Assuming you have a PCAP file with HTTPS traffic and having the key pair (private & public), it is possible to decrypt the traffic if it uses Diffie Hellman Ephemeral? Using openSSL lib for example.
As far as I know the answer is no because DHE generates a new pair for each connection, so it do not uses the key that we... |
Over time I have installed several additional trusted CA certificates to Windows trust store, sometimes because an app pushed me to do so, other times for reasons of development and testing.
Is there any command to restore the default (or currently MS recommended) trusted CA certificates and delete any other entries?
|
what are the different ways to become anonymous. Is quicksilver a good email for that? What are the different options?
I know about proxies, Tor, and VPNs. Should I do all three? I like computers but I don't know how often I want to configure Tor settings. How long does it take to learn? How good are VPNs as an option ... |
Google and Yubico just announced the availability of cryptographic security tokens following the FIDO U2F specification. Is this just another 2FA option, or is this significantly better than solutions such as SecureID and TOTP?
Specifically:
In what way is U2F fundamentally different from OTP?
How does U2F affect the... |
I'm testing a commenting application that takes a link of the form http://google.com and puts it in an href tag as so:
<a rel="nofollow" href="http://google.com">
The resulting comment is stripped of http:// or https://.
In testing, I've been attempting to utilize some form of http://"onmouseover="alert(1); this way I... |
So I was wondering if I could determine if a wireless network is asking for a specific type of key such as WEP/WPA ect? Or if it just takes the one you give it and processes that?
|
I want to be able to build a good file encryption on android for a cloud app.
The files used are mainly pdfs, pngs, docs, audio, video, etc (all sorts of files).
Edit:
My constrains are that it should be fast enough, so the users of the cloud app don't wait forever to upload/download. Also, the encryption must be sec... |
I'm building a (very simple) tool to communicate between two servers. I started by asking if there was a better alternative than making a home made scripts and we came to the conclusion that for starter, a home made script was enough. (On stack-overflow, but since the discussion only occured in the comments, the questi... |
In the wake of POODLE I am reviewing the configuration of a number of Tomcat servers running on the JSSE connector.
In order to work out what ciphers JSSE supported I wrote a little snippet that emitted all the available ciphers, the result was:
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
SS... |
A rather theoretical question: Assuming there is memory with a malware inside it. The malware's goal is to detect if a legit application is about to delete contents of the memory.
If recognized, the malware would copy parts, which are not deleted yet, to other locations, which already have been deleted and thus effecti... |
I have a sync app that doesn't work and the developer asked me to try and perform a sync with Wireshark capturing the data and send the Wireshark log to him.
I noticed that Wireshark saves sensitive data in the log, like the MAC address of both my devices involved in the sync process. Is there a built-in feature with w... |
I try to understand what happens when I use an HTTP(S) proxy in my OpenVPN client configuration.
What's the advantage of an HTTPS proxy over plain HTTP? In any case the encryption takes place on the client and the encrypted package is then routed through the proxy to the VPN server, right?
Which IP does the VPN server... |
I have been doing some reading on the mechanics of managing RSA key pairs, during which I learned that OpenSSL by default derives the encryption key by using MD5 on the passphrase (bad!) without any key stretching (worse!):
But how do you get from the passphrase to the AES encryption key? I
couldn’t find it document... |
I noticed some curious traffic today on my MBP after running lsof. It seemed that a process called rdmd had begun 3 TCP sessions:
rdmd 85842 0 9u IPv4 0xca0e547f0a118fdb 0t0 TCP *:6103 (LISTEN)
rdmd 85842 0 10u IPv4 0xca0e547f0bc57fdb 0t0 TCP *:6102 (LISTEN)
rdmd 85842 ... |
We have a taxi app which has been quite successful in Europe. But recently one of our competitors has started checking if our app is installed and if it is, theirs won't run until the user uninstalls our app from their phone.
We initially did a few manual updates with a different package name to bypass their check but ... |
I'm performing a static analysis on a PHP code and came across this situation:
include_once SYSTEM_PATH . 'languages/content-' . $_COOKIE ['lang'] . '.php';
If I try to hack with this HTTP request:
GET /en-us HTTP/1.1
Host: xxxx.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:32.0) Gecko/20100101 Firefox/32.0
A... |
I'm interested to know if there is any reliance on system time (as defined by Linux or windows) when initiating a secure handshake. I'm aware that TCP typically uses a random number (RFC 1323) to provide a time stamp for message ordering, however I'm not sure of the TLS utilisation of system time. You can imagine this ... |
When users register on my site, I want to store their username and hashed password in my database. When I hash that password, I'm going to salt it using PHP.
The issue is, I don't want to store the salt in a database that could be compromised - that defeats the purpose of salting, doesn't it?
Instead, I want to have a ... |
When I need to properly wipe a harddrive, I tend to use shred on the whole device, i.e. pointing shred to the /dev/sdX without regard to particular partitions; however I noticed that the device size listed by shred command in the progress lines is always approx. 7 % smaller than the device size listed by fdisk (on a 50... |
I currently examine the hidden components of a smartphone, inspired by the research of Weinmann All your baseband belong to us and Karsten Nohl Rooting Sim Cards.
According to Weinmann, the application processor (with Android e.g.) and the baseband processor can share memory, so that an attack and takeover of the baseb... |
I'm trying to create an API with minimum forced structure. The messages can come from end user device or from a backend server.
I'm ok with opening separate API for end user traffic and from servers.
The client are web and mobile companies that can send their data to the API.
(Think google analytics for websites, mobil... |
I want to do some research on network anonymity.
Assume that I am careful enough not to disclose any personal information while connected to an anonymous network.
If I run a system that uses Tor over a VPN that I paid for with Bitcoins (free VPNs are very slow) and also use Tor browser to avoid scripts and use a masked... |
There is currently a debate in my office on the best location to place a vulnerability scanner (a distributed scanner - Rapid7 Nexpose, using scan engines) within a data center.
I see two options:
Place the virtual appliance in a secured VLAN, open ip any from the appliance to all IP addresses in the DC so we can ensu... |
I'm going through a bunch of accounts at the moment changing my passwords, some of them are looking a little weak and i've reused them, but i keep coming across websites that don't allow you to use symbols in the password, including my bank.
Why would websites not allow symbols and cap the password at 20?
From what i'v... |
Suppose I had a vulnerable query like this:
var q = 'SELECT x FROM y WHERE id = ' + req.body.id + ' ORDER BY date DESC;';
For the purposes of this question, req.body.id could be any integer parameter that isn't type-checked as everything over HTTP is a string.
Since the MySQL extension disables multi-statement queries... |
I installed Joomla 3 to /var/www/html directory in Cent OS 6 server. Currently /var/www/html is owned by apache:apache.
What is the recommended permissions for Joomla installation on Linux in production environment. Who should own what with which permission?
|
Say I have a site that allows me to save my name to the database, and that name is then displayed to other users.
I have determined that if I save the following as my name:
Abe <script>alert(1);</script> Miessler
Another page in the site will take the following steps all on the client side:
Make an AJAX request to ge... |
I'm running a application classification program which detects the application based on training datasets and signatures. I'm getting a alert of BitTorrent is running on my system but the application is not installed on my system. Actually it is classifying BitTorrent based on the destination port used 6881, Since 6881... |
I've had a long running conversation with a client where they perform a Rapid7 security scan which then warns about TCP MD5 checksums missing on port 80. This is what I think I know:
RFC 2385 was designed to protect BGP, and by extension BGP-type protocols (i.e. long running TCP connections).
BGP uses long-running TCP... |
I'm currently in the process of compiling a Ciphersuite policy to be used on all of our new WS 12 & IIS 8.5 web servers.
In the past I've always manually applied the registry keys into SChannel but I've come across the handy tool, IIS Crypto.
I always intended to disable SSLv3 and have been wanting to do this for qui... |
Some days ago I read about the Shellshock bug and I wanted to test a CUPS server for it and readed some example codes to build this code:
() { test;};echo /"Content-type: text/plain\"; echo; echo; /bin/cat /etc/passwd' "http://anything.xy:631/printers/jobs.cgi?ORDER=asc&QUERY=123&x=0&y=0
I've inserted it to a custom Fi... |
Maybe some of you remember that in November 2013 the respected researcher Dragos Ruiu claimed that he was infected by some super advanced virus that no one ever heard of before.
Experts agreed that things that he described are possible, but the fact that such an advanced piece of software was used to tease one research... |
I have a Java based application (running on java 5 or higher) that establishes an SSL connection towards an Apache tomcat 7.0.47 on java 7.
From what I understand, to exploit POODLE you need a client that explicitly does out-of-protocol downgrading. Something that web browsers do all the time, but very few other client... |
After installing the LastPass password manager, I am presented with a login dialog including the option to "Disable Insecure Firefox Password Manager".
(This option appears as long as the Firefox Password Manager is enabled, whether or not a master password is being used.)
Is Firefox less secure than LastPass for the ... |
Im trying to embed exe file to pdf for case study.
I try using metasploit exploits for this but i can only embed shellcodes with this method.
I know there is a way to embed exe file but i cant find one
Suggestions?
Thanks.
|
Project BISmark aims to measure broadband service by recording and reporting on service using OpenWRT-based router firmware (software licensing unclear, no LICENSE or COPYING files in the repos) with results published publicly. Their privacy statement highlights that they collect only service information, not network t... |
I've been fiddling with the Windows firewall configuration of some computers within a VMWare based LAN (no domain). To aid in my testing and debugging, I created a small, self-hosted console application that will answer HTTP requests, an "answering machine" if you will, so that I can easily check connectivity between c... |
An online banking site which I use, has a "feature" which disallows a user from pressing Enter to submit a login form. For example, if you have typed your username in the Username field, pressing Enter will show a message "Please click Login to login".
Most users would follow by using the mouse to point and click. Howe... |
Just curious - if I'm using an end-entity (leaf) certificate that has a SHA-1 signature, does that mean that ALL certificates in the chain also must use SHA-1?
|
A lot of password managers seems to promote client-side encryption as a key feature of their service. For example : LastPass, Firefox Sync, PasswordBox, etc...
They all say something like
Even we don't know your master password and cannot decrypt your data,
hence it is more secure.
Making the user think that it pro... |
I am using xsser for XSS vulnerability testing and I have a doubt about the parameters when it's a POST method.
I have tried against DVWA (which uses get) with success like this:
xsser -u "http://server.com/vulnerabilities/" -g "xss_r/?name=" --cookie="PHPSESSID=vjs31bec4gfvob6bcjmau2a644; security=low" -s
Now, agains... |
I have noticed that it is common practice when setting up a user account (Windows users accounts and Google Apps user accounts in my case) to require new users to create their own password immediately after their first log on. In searching for an answer to this question, I have found many posts explaining how to requir... |
I'm trying to disable SSLv3 in ejabberd 2.1.10 on Ubuntu 12.04. There is no way to disable it in config file, so I have to patch the source and rebuild the package: https://github.com/processone/ejabberd/issues/113
The problem is after patching and installed, how can I verify that SSLv3 protocol is disabled? It is a pr... |
Regardless of how the password was obtained (decryption, bad hashing, confession):
Are there any prior known cases where the contents of the password was used to prove motive or guilt?
Or, looking at it from the perspective of an ISP doing anti-fraud checks: suppose 2 accounts have the same password hash; assume they... |
So I followed this for setting up client ssl certs using openssl: http://drumcoder.co.uk/blog/2011/oct/19/client-side-certificates-web-apps/
It basically walks through creating a new CA key, and then creating both a server.crt and client.crt and signing them with the CA key.
I have two questions:
1) I couldn't get it ... |
In most scenarios a person identifies who they are (authentication/AuthN) via something like a username and password. Afterwards a system would likely evaluate what that validated identity can perform (authorization/AuthZ) via something like AD or LDAP groups.
Does anyone know of systems that evaluates authorization fi... |
It seems like there are lots of ways to prevent man in the middle attacks. I've read many on here and on the rest of the internet. According to wiki you need a secure channel as well to completely safeguard against it. I have two questions in regards to preventing it in the real world.
Does the US government monito... |
One of our OpenBSD firewalls experienced a flood of UDP traffic from a compromised host within our internal network. The traffic was exchanged between the compromised internal host and a single external host but across a large number of UDP ports.
(example traffic, names have been changed to protect the innocent)
all u... |
mysql_select_db($db.'_'.$table);
include("/home/site/includes/".$type."/functions.php");
Would this be a bad idea if $table and $type are values passed via ajax from a JS script?
And this..
$function($args);
If the value for $function is passed via ajax?
|
I'm curious which would be more secure, pub key authentication or 2-factor auth via Google Authenticator. Apparently I can't use both. If I have pub key authentication, the Google Auth PAM module doesn't ask me for a verification code. But if someone tries to log in with a regular password, it does. So it seems it's ei... |
I'm planning to buy a second hand computer (2012 Mac mini, which is no longer available in stores). Because I'm not sure if there is any malware in the computer so I will perform hard format several times. I think this could prevent malwares to exist in the drive. But I'm not sure if this is enough for ensure the safet... |
When I put Username:anything and Password : 1'or'1'='1, my database retrieves the first row from MYSQL table. How do I retrieve the row corresponding to Username:anything? This is for a project in which I need to show all possible SQL vulnerabilities and rectify them.
|
I was wondering if it's at all possible to compile only the crypto functionality of OpenSSL that I want? In particular, is it possible to compile just SHA1, AES, and DH parts of OpenSSL?
I followed the advice at Build OpenSSL with just RSA and AES but it seems it is outdated for 1.0.1g that I am trying to build.
The wa... |
I am relatively new to the world of cryptography and was wanting to develop a webpage which allows credit card payments. Thus, I looked into the digicert ssl service, hoping that it could do what I want.
My question is, if an asymmetric encryption requires some form of exchange and protocol between the server and end-u... |
I'm building a web app. The app needs to keep certain data within the database very secure.
Please assume for the moment that I don't have a HSM or Key-Management facility and can't afford to implement one.
When storing away a user's data, I want to generate a random key and provide it to the user. This will not be sto... |
I want to know the major security threats involved in storing the session variables in client side local storage, instead of storing it in the cookies. Can somebody give me a brief description?
|
Do we really require to eliminate the share drive access to the PCI users.
We have a file server outside PCI VLAN. But PCI users have access to it.
We dont have any DLP solutions. Does the PCI standard requires to eliminate file servers?
|
We are trying to disable sslv3 for poodle vulnerability.so i disabled in ssl.conf
SSLProtocol -ALL +TLSv1 -SSLv2 -SSLv3
and tried to connect using tlsv1 using openssl command.
openssl s_client -host localhost -port 8001 -tls1
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS ... |
I've just ordered a cheap-o netbook on Amazon, with the intention of installing a Linux distro, and turning it into a permanently-offline high-security machine for sensitive tasks.
However, I'm no security professional, and I need some advice and tips, now that I'm finally undertaking this task. Amongst any general adv... |
It's well known what measures one should take to prevent hackers from hacking their PC. But are there any steps that allows a user to evaluate the damage done by a hacker?
Say that I know for sure that someone hacked me yesterday. But I have no idea what they did when they were in my PC. Is there a way to know what fi... |
I was doing a security research on storing the session id in local storage instead of storing it in cookies. I understand that it is not possible to tag the values in local storage as HttpOnly and so it may be vulnerable to XSS attacks. Since all the inputs are properly validated I am free from this issue.
But the oth... |
My aim is to have an (iOS) app in which the user would login, then on sucsessful login, gain access to additional information over an encrypted webservice (undecided).
From research, I understanding encryption techniques of diffie-hellman key exchange, and 'signatures' using HMAC with secret key (from the diffie-hell... |
I have a problem viewing HTML/JS/CSS files generated on disk. Specifically, several calls in javascript are blocked by Google Chrome. I googled and found an answer here: https://stackoverflow.com/questions/21408510/chrome-cant-load-web-worker. In the end, I have to go an extra mile to install and run a websever on my m... |
I routinely shred documents with any personal information on them to protect myself and others against identity theft. I have no doubts that shredding any documents with ID numbers, account details and the like is a good idea, however I am wondering whether there is any protection to be gained when documents just have ... |
Lately, I've noticed the addition of "/webhp" in the url of Google searches along with some additional variables, "sourceid", "rlz", and a few others. Together, they make a URL in the form of https://www.google.com/webhp/... In addition, this only happens when searching from the Omnibox. Going to google.com and sear... |
I run a website at https://fastslots.co. I just discovered that I am getting requests from the URL https://canadaehtees.com/ that I have no affiliation with. When I load canadaehtees.com in my browser I get a warning about an invalid SSL certificate. If I proceed anyway, the site that is displayed looks and behaves exa... |
Given that RC4 is a stream cipher (I'm pretty sure the details of its inner workings don't matter for the sake of this argument) and the existence of Mixed Scripting / Mixed Display (web applications requesting and retrieving contents both over unencrypted and encrypted channels). Does the combination of a stream ciphe... |
At my school they are requesting my MAC address so that I can use the schools Wi-Fi. Now I understand that the school can see what sites I am going to while I'm at school. But can the school see what I am searching when I am at home (using a different network)?
|
I have VOIP service from PhonePower...
They give their users an MTA device to connect to their network, however their instructions are that the user must turn on DMZ-Hosting for this device, to allow their service to work.
The problem I see with that is the warning message associated with this setting in my router's fi... |
I have written a short guidebook that I have been selling hardcopy. There is now interest in a digital version. How do I protect this guidebook so only the people who purchase it have access to it? I don't want them to be able to forward it to someone or load onto more than one computer?
|
can somebody explain in detail how old floppy disks copy protection works?
Someone told me that it was based on an error on a trace of the floppy that was read only during the copy (and never when the program on the floppy was executed)...
Thank you
|
I've been reading up on wireless authentication and shared key authentication sounds completely bonkers. I know WEP is very insecure and breaking it with aircrack-ng takes 5-15 minutes but this sounds worse.
Basics:
The station sends an authentication request to the access point.
The access point sends challenge text... |
The PCI DSS v3 standard states the following:
Network Segmentation
To be considered out of scope for PCI DSS, a system component must be properly isolated (segmented) from the CDE, such that even if the out-of-scope system component was compromised it could not impact the security of the CDE.
Say we have a cloud base... |
I need to send authenticated ciphered messages by using a single password. Reusing the same (derived) key for the block cipher and the HMAC is not a good practice, I know.
My initial idea is to derive two different keys from the password in order to apply a encrypt-then-MAC scheme:
Key1 = PBKDF2(passwd, SALT1, ITERATIO... |
In a context of proprietary client boxes and servers, I want to limit authentication to ECDSA keys. Historically, "RSAAuthentication yes" was used to enable authentication with RSA and maybe DSA keys. Does it mean "key authentication enable" or strictly "RSA key authentication enable"? Should I set it to false?
|
Say we have a cloud based web application which is SaaS. This application is to be made PCI compliant as a service provider, as client card data passes through the application. This application uses a database for its configuration information.
Please note that the database only contains configuration information. No c... |
I use a commercial email service that provides IMAP over SSL on port 993 and SMTP over SSL on port 465. I currently connect to their servers with Thunderbird and the Apple's iOS8 email client.
Could these connections be vulnerable to POODLE? My impression is that the SSL connection negotiated on these ports might be SS... |
I have a web site that lets users upload a profile picture that is then visible to other users of the site.
What steps should the site take to protect user privacy?
For example, some Jpeg files may have a geotag in the metadata. It seems to be standard practice to strip this. But, what else should be stripped?
|
Google recently announced support for Universal 2nd Factor (U2F) authentication in Chrome and started allowing that authentication mechanism to be used for 2-factor authentication across their various web services. After reading up on U2F I'm starting to really like the idea, but I also noticed that the Fast IDentity O... |
I've started browsing the deep web recently and have seen a lot of illegal content. Now while I have no interest in any of the illegal content, I don't want to be caught on one of these sights because of a misclick, clicking on a misleading link, or clicking on an unknown link and get in trouble. Plus I guess I would f... |
I have following theoretical question:
Let H(X) be a hash function which is considered as weak because collissions can be produced (e.g. SHA1, MD5).
I wonder if following functions:
H2(X) = H(H(X)) xor H(X)
H3(X) = H(H(H(X))) xor H(H(X)) xor H(X)
H4(X) = ...
can be considered as safe, if H(X) is considered as unsafe. ... |
I have a question about the max amount of dictionaries need to crack a wpa2 or wpa2-psk password
I am using aircrack-ng on ubuntu
Is there any possible way to calculate the maximum amount of dictionary files need to crack the wpa or wpa-psk password solely based on the information from the encryption?
I recently learne... |
I think somebody (maybe one of my neighbors) has access to my WiFi and is using it, because even when I reset my WiFi router it gets very slow, and some of my computers seem to have their WiFi disconnected because someone else is using it.
My question is: Is there any alternative to resetting the WiFi router to "kick" ... |
What would be a more secure way to encrypt files using TrueCrypt 7.1a. The is an airgapped computer (wifi, bluetooth, speakers and mic removed too). The encrypted files will be on an external drive in either setup and not on the system's HDD.
An FDE TrueCrypt notebook running Windows.
A MacBook running OSX but without... |
I searched in google for "ASP.Net 4.0.30319 vulnerability " keyword.
finally,I found "Microsoft ASP.NET Forms Authentication Bypass" in below link:
http://dl.packetstormsecurity.net/1203-exploits/SA-20120328-1.txt
but I don't know how to penetration test this vulnerability. otherwords , if someone get me one applicat... |
I am getting the solid red screen Chrome browser malware warning for Google's own URL shortening website, goo.gl as well as other sites such as bit.ly and delicious.com when I try to navigate there directly via the web (not mobile/tablet device) tonight.
This seems rather unlikely! What might be the cause?
|
I clicked this link
http://girlsguidetosurvival.wordpress.com/
Chrome gave me this warning -
Attackers currently on bit.ly might attempt to install dangerous
programs on your computer that steal or delete your information (for
example, photos, passwords, messages, and credit cards).
Google Safe Browsing recentl... |
I click on a bit.ly link on a Youtube video and I was fronted with this.
I have used bit.ly before and I entered the url manually, but Firefox came up with this.
Any ideas?
|
Our company uses a web server with a couple of web sites on it (private and public, over HTTP and HTTPS, some low risk and some high risk including online payments or other sensitive data for example).
In our last project, we communicated with a partner company through web services. They wanted to use their own certifi... |
I followed this tutorial (http://elinux.org/RPI-Wireless-Hotspot) for an Wifi Hotspot in the guesthouse. This is working fine, but every device on the WiFi network can reach any LAN device in the LAN and vice versa. I don't want this (or at least block ARP spoofing) because there is some sensitive HTTP traffic (I can't... |
I was testing my Node.JS application. When I opened my app using Chrome and Mozilla, I saw these JS files included in every page I browse. They appear in all browsers I use (Firefox, Chrome).
<script type="text/javascript" src="http://j.midnightjs.net/omeltest/common.js?appTitle=PennyBee&channel=chkomel68&hid=v... |
In spite of all the hacking news in the recent few years I never heard of someone who managed to hack a TV channel. What makes them so secure?
|
A typical account creation process seems to be:
Provide email address and set a password
Receive confirmation email with a link and/or hashed token
Click the link to verify and/or enter the token on the site
However, I once read somewhere (and I can't find this now, which is why I'm asking) that a better process woul... |
I have a machine with the Windows 10 preview installed and I want to capture all the traffic it sends for a day and then block all the MS hosts it sent data to without my direct permission.
I don't want to do this with Wireshark on that computer because Microsoft might have implemented their keylogger hidden on lower l... |
When you're using Snort for real-time monitoring the messages are logged to /var/log/snort/alerts.
However, when you load a pcap file, where do you see if any packet triggered a rule? Because they are not stored in that same directory.
|
Just about now a friend of mine got compromised, actually she was compromised by various adware since long ago but she installed something (her browser was hijacked to deliver even more malware) and the machine crashed.
I told her to reinstall from the recovery partition since she's not tech-savvy and doesn't know how ... |
The system I want to implement has the following requirement: All users can insert some sensitive data, but only one, master user, can see it.
There is any known, already implemented solution to this issue? I have to encrypt data so without the master password is impossible to read it.
The only solution I thought about... |
The way I understand it, when you write to a copy-on-write filesystem, data never gets overwritten in place, instead new data is written to a new location, and the old data will only be overwritten when the filesystem runs out of space.
If I put an encrypted container (luks for example) on top of an zfs filesystem, and... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.