Skip to main content

Top Questions

0votes
0answers
11views

Are secrets from automatically unlocked keychain in Ubuntu 24.04 Seahorse accessible for any application?

0votes
0answers
17views

For AES-GCM, why do protocols not use the nonce to prevent replay attacks? [migrated]

10votes
2answers
3kviews

What are the preferred ways to exchange public keys physically?

2votes
0answers
56views

Impossible optimization in IKE Intermediate RFC?

2votes
1answer
125views

Extract CRT and KEY from signed PEM file without the openssl tool

9votes
3answers
2kviews

Overlap for One-Time Passwords

-3votes
0answers
89views

How to know whether a plate number is being faked or not? [closed]

4votes
2answers
652views

Are truncated SHA-256 hashes safe enough when collisions are not a risk?

3votes
2answers
862views

Hiding information in the SAN field of a certificate

0votes
0answers
28views

Can my work see my BitTorrent downloads on a personal device when logged into the company WiFi? [closed]

0votes
0answers
22views

How can I stop C code from debugging while it's being compiled using GCC? [closed]

0votes
0answers
24views

Creating a pentester tool in c/c++ that's used for controlled sections like bug bounty programs? [closed]

5votes
2answers
1kviews

Accessing a database publicly via HTTPS API vs. native but with client certificates

3votes
1answer
29views

How to migrate an OLD Yubikey with an OLD PGP key to a NEW Yubikey with a NEW PGP Key? Cross-signing, certifying, etc

3votes
2answers
695views

Are client certificates a secure way of having publicly facing SQL database?

2votes
1answer
177views

For the same private key, I have two slightly different public keys. Is it normal?

0votes
0answers
23views

Checkmarx seeing vulnerabilities in DLL files but the package has already been updated

0votes
0answers
19views

Issues consuming HTTP FastAPI from HTTPS-embedded widget (frontend fetch)

9votes
3answers
3kviews

Is it acceptable to ignore potential XSS payloads if they are not executed on our side?

4votes
2answers
1kviews

How to check if a file contains exploit for a specific zero day vulnerability?

1vote
0answers
73views

CTF finding flag in an image [closed]

0votes
0answers
51views

Sanity check on how bad my router's VPN is [closed]

0votes
1answer
62views

Is using software without buying all available patches against security standards?

1vote
1answer
92views

Is it safe to publish encrypted secrets in a git repository?

1vote
1answer
24views

Is using req.path as a file path in an Express route vulnerable?

0votes
0answers
27views

Server invisible cookies using service workers [migrated]

0votes
1answer
51views

Is this an effective scheme to store EEE key on browser client?

13votes
4answers
3kviews

Cryptographic strength of VeraCrypt

2votes
1answer
239views

What is the hashed password in the master.passwd file?

3votes
1answer
1kviews

Can a public certificate provider impersonate an AD?

-2votes
0answers
63views

Why is open banking called open banking [closed]

0votes
0answers
35views

How to detect if HDD DCO (Device Configuration Overlay) has been modified, and why does --dco-identify sometimes fail? [closed]

3votes
1answer
3kviews

Are there any security concerns with this authentication flow?

0votes
1answer
103views

Setup Tor Hidden Service Anonymously

1vote
1answer
53views

Windows RPC "ephemeral" ports

1vote
1answer
115views

How to securely build code from the internet on my servers?

1vote
2answers
80views

Why would a file need both a rmd160 and a sha256 hash of a file?

12votes
3answers
3kviews

Why shred before LUKS disk encryption?

0votes
1answer
85views

How exploitable is a redirect caused by sending a malicious X-Forwarded-Host header?

4votes
0answers
141views

What if MITRE's CVE goes dark? [closed]

6votes
4answers
2kviews

Hashing security question answers for bank account portal activation

2votes
0answers
49views

Why can't a Cognito user in the FORCE_CHANGE_PASSWORD state go through the forgot password flow?

-2votes
1answer
49views

what is the recommended xml secure configuration to prevent xxe

0votes
0answers
48views

How to determine what was done to the string before it was hashed? [duplicate]

2votes
0answers
23views

How to Configure BeEF Autorun Engine to Trigger Rules on Every Zombie Hook

1vote
1answer
41views

How is SLSA compliance meant to be used? Is it something you're meant to advertise to end users?

1vote
1answer
43views

Using OPAQUE without envelope checksums

4votes
3answers
416views

Signal: Does anyone *know* if the Yemen group chat was insecure?


Looking for more? Browse the complete list of questions, or popular tags. Help us answer unanswered questions.

close