Skip to main content

Top Questions

0votes
1answer
539views

OAuth alternative for two-party scenario?

1vote
1answer
287views

Using AWS System Manager Parameter Store SecureString in config file in ec2

0votes
0answers
17views

For AES-GCM, why do protocols not use the nonce to prevent replay attacks? [migrated]

1vote
1answer
5kviews

Can I create an SSL certificate on windows signed with the machine's certificate?

2votes
0answers
53views

Impossible optimization in IKE Intermediate RFC?

3votes
1answer
606views

How to detect malicious actor altering DNS responses?

2votes
1answer
2kviews

Apple Mail versus GMail app content security

-3votes
0answers
86views

How to know whether a plate number is being faked or not? [closed]

2votes
1answer
122views

Extract CRT and KEY from signed PEM file without the openssl tool

10votes
2answers
3kviews

What are the preferred ways to exchange public keys physically?

1vote
1answer
580views

AES ECB cookie bypass

0votes
0answers
21views

How can I stop C code from debugging while it's being compiled using GCC? [closed]

4votes
2answers
647views

Are truncated SHA-256 hashes safe enough when collisions are not a risk?

0votes
0answers
28views

Can my work see my BitTorrent downloads on a personal device when logged into the company WiFi? [closed]

6votes
2answers
128views

Can a nonconformity be raised against a control - for ISMS audit based on ISO 27001?

0votes
0answers
24views

Creating a pentester tool in c/c++ that's used for controlled sections like bug bounty programs? [closed]

3votes
1answer
366views

Is it safe for website to generate fake profile pages?

3votes
1answer
29views

How to migrate an OLD Yubikey with an OLD PGP key to a NEW Yubikey with a NEW PGP Key? Cross-signing, certifying, etc

2votes
2answers
1kviews

tunnelling HTTP request through DMZ from a secured area

9votes
3answers
2kviews

Overlap for One-Time Passwords

2votes
1answer
642views

HTTP Headers: Document Policy vs. Permissions-Policy/Feature-Policy

2votes
1answer
3kviews

how to generate RSAES-OAEP keys?

0votes
0answers
18views

Issues consuming HTTP FastAPI from HTTPS-embedded widget (frontend fetch)

0votes
0answers
23views

Checkmarx seeing vulnerabilities in DLL files but the package has already been updated

1vote
1answer
277views

How does DNSCurve protect against forgery in a man-in-the-middle attack scenario?

0votes
0answers
51views

Sanity check on how bad my router's VPN is [closed]

2votes
1answer
176views

For the same private key, I have two slightly different public keys. Is it normal?

2votes
2answers
164views

What's the point of users having to authorize their SSH keys and tokens they created themselves when SAML single sign-on is enabled on GitHub?

1vote
2answers
737views

What are some symptoms of malware exfiltrating data in packet captures?

2votes
1answer
371views

Which OAuth2 flow should I use?

3votes
2answers
860views

Hiding information in the SAN field of a certificate

0votes
2answers
1kviews

Crunch wordlist with different number of words

2votes
1answer
836views

OpenID Connect Web Message Response Mode and XSS

1vote
1answer
24views

Is using req.path as a file path in an Express route vulnerable?

3votes
3answers
3kviews

Gaming Mods Security Risks

0votes
1answer
295views

Does Windows Defender remove registry keys and scheduled tasks for items on its exclusion list?

0votes
0answers
27views

Server invisible cookies using service workers [migrated]

23votes
3answers
7kviews

Why is the synchronizer token pattern preferred over the origin header check to prevent CSRF

1vote
0answers
71views

CTF finding flag in an image [closed]

3votes
2answers
365views

Encrypted log entries authorization

3votes
2answers
694views

Are client certificates a secure way of having publicly facing SQL database?

1vote
1answer
684views

Getting reverse shell from firewalled target

0votes
0answers
7views

Gathering entropy at different times using a cycle counter [migrated]

0votes
1answer
59views

Is using software without buying all available patches against security standards?

1vote
1answer
92views

Is it safe to publish encrypted secrets in a git repository?

0votes
2answers
714views

Getting a couple of remote login and calls into Ubuntu server?

0votes
1answer
51views

Is this an effective scheme to store EEE key on browser client?

5votes
2answers
1kviews

Accessing a database publicly via HTTPS API vs. native but with client certificates


Looking for more? Browse the complete list of questions, or popular tags. Help us answer unanswered questions.

close