Top new questions this week:
|
I noticed that, while browsing through many bug bounty and vulnerability disclosure programs, they don’t accept issues that are related to TLS/SSL, which includes expired security certificates. Why …
|
Assuming I have secret data that is encrypted (using sops for example) and a checksum of the secret data for change detection: Is it possible to derive secret information from the checksum or should …
|
I’m sort of confused due to contradicting information about it but I just want to know if it’s important for an attacker to be on the same Wifi network if he wants to deauthenticate another user?
|
An IoT device using mutual TLS can have a long running TLS connection to a server, during which time its client certificate could expire or be revoked. When that happens should the server notice and …
|
In absence of better solutions, is the nonce is an OpenID Connect ID Token usable to serve as digital signature. The process would be as follows: A hash is created from the to-be-signed document/…
|
I’m evaluating running Chromium without native sandboxing in a rootless container. A few points: You can containerize Chrome using rootless containers with something like podman. This will utilize …
|
Let us assume that we have a public API, for example, company.com/publicEndpoint, that can accept requests from any source. Various websites, like foo.com and bar.com, use JavaScripts that call this …
|
Greatest hits from previous weeks:
|
I have an internet connection with a static IP address. Almost all staff in my office know this IP address. Should I take any extra care to protect myself from hackers?
|
My email-provider’s website (www.gmx.de) recently started linking to the (German) site www.browsersicherheit.info/ which basically claims that due to its capabilities to modify a site’s …
|
I am very confused the difficult jargon available in web about OAUTH, OpenID and OPENID Connect. Can anyone tell me the difference in simple words.
|
I have some questions regarding IMEI numbers and data and identity theft. While searching online I have found many conflicting answers regarding this topic and would like some clarification if …
|
What is the difference between SSH and SSL? Which one is more secure, if you can compare them together? Which has more potential vulnerabilities?
|
Is it possible to provide a subjectAltName-Extension to the openssl req module directly on the command line? I know it’s possible via a openssl.cnf file, but that’s not really elegant for batch-…
|
If I am using a VPN to connect to Twitter, can an organisation like Anonymous or Lulzec track me and find out my identity?
|
Can you answer these questions?
|
I’m trying to connect to my meter by using some open-source software, all the meter supports the dlms-cosem standard. But the problem is the meter disconnected due to a failed security check. After …
|
To begin, please someone correct me if I am wrong, but I believe OutGuess was definitively broken in the paper “Attacking the OutGuess” in 2002 and this attack was never patched. It seems …
|
I am testing a cross-site scripting attack on a website, as we all know the Request.Form function validates the input so the user couldn’t insert a <script> inside the input. My focus in this …
|