Newest Questions

0votes
0answers
3views

Are secrets from automatically unlocked keychain in Ubuntu 24.04 Seahorse accessible for any application?

I am familiarizing with Ubuntu 24.04 and Seahorse. I recently connected to a password-protected network drive, and the password is now stored in my "login" keyring, which is encrypted with ...
hoelzeli's user avatar
0votes
0answers
7views

LinkedIn website automatically gets my email address in Edge without consent, can all websites I browse silently get my email? [migrated]

I'm using Edge 135 browser on Windows 10. I am currently logged in my Gmail account, but not logged in LinkedIn. When browsing to https://www.linkedin.com (I never logged in on this website since I ...
Basj's user avatar
  • 963
0votes
0answers
17views

For AES-GCM, why do protocols not use the nonce to prevent replay attacks? [migrated]

For protocols using AES-GCM, it appears to be common practice to store the sequence number in the additional authenticated data (AES_GCM and TLS sequence number). I have not found any instances of ...
Coffe's user avatar
2votes
0answers
54views

Impossible optimization in IKE Intermediate RFC?

RFC 9242 - Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2) describes a new IKEv2 exchange type called "IKE_INTERMEDIATE". The purpose of this type is to allow ...
hakoja's user avatar
-3votes
0answers
87views

How to know whether a plate number is being faked or not? [closed]

I’m not sure whether this question fits better under AI, Cryptography, or Security. I’ll place it under Security for now, since AI Security has become a new and growing domain. I have developed an ...
Muhammad Ikhwan Perwira's user avatar
2votes
1answer
122views

Extract CRT and KEY from signed PEM file without the openssl tool

Is there any way to extract a private key from a PEM file without the openssl tool on Windows? Windows MMC won't do the trick as I cannot export to PKCS#12 due to my work laptop security restrictions ...
mortirolo's user avatar
0votes
0answers
21views

How can I stop C code from debugging while it's being compiled using GCC? [closed]

These days, software programs on the internet have a number of security features. These are taken seriously by the most fundamental reverse engineers, who use them to demonstrate that the codes are ...
Acknowledge's user avatar
0votes
0answers
28views

Can my work see my BitTorrent downloads on a personal device when logged into the company WiFi? [closed]

A slightly paranoid post here. I have a BitTorrent client running on my phone which was downloading some adult content. Stupidly, I left it running when I went to work. When we connect to my works ...
Plump Wagon's user avatar
0votes
0answers
24views

Creating a pentester tool in c/c++ that's used for controlled sections like bug bounty programs? [closed]

I have been looking for some code to help me do it. Can anyone help me get it done? I have the following code: if [ -z "$1" ]; then echo "Uso: ./ReaperScan.sh <ip>" exit ...
diego rego's user avatar
3votes
1answer
29views

How to migrate an OLD Yubikey with an OLD PGP key to a NEW Yubikey with a NEW PGP Key? Cross-signing, certifying, etc

A few years ago, I set up my Yubikey with PGP by following Dr.Duhs Yubikey Guide. I created an offline Certify key / Master key on a live usb distro, and then created the corresponding sub keys (S,A,E)...
DanRan's user avatar
0votes
0answers
18views

Issues consuming HTTP FastAPI from HTTPS-embedded widget (frontend fetch)

How can I make a frontend widget on HTTPS communicate with an HTTP FastAPI backend without CORS or mixed content issues? I'm building a chatbot widget that's embedded into a website served over HTTPS. ...
Angel Panda's user avatar
0votes
0answers
23views

Checkmarx seeing vulnerabilities in DLL files but the package has already been updated

I'm checking .NET app. Checkamrx is saying that the package System.Drawing.Common 4.7.0 is vulnerable. So what the dev did, they updated it using the NuGet package manager so I'm guessing it's gonna ...
willie revillame's user avatar
4votes
2answers
649views

Are truncated SHA-256 hashes safe enough when collisions are not a risk?

Apologies if this is a duplicate, I’m having trouble even to find the right words for it. As far as I am aware, password authentication usually works in a way that the server stores a hash of the ...
cdauth's user avatar
10votes
2answers
3kviews

What are the preferred ways to exchange public keys physically?

Suppose I have the privilege to being able to physically meet a person that I want to communicate with beforehand. Suppose the person and I have minimal trust --- it could be the first time we get to ...
Guanyuming He's user avatar
3votes
2answers
860views

Hiding information in the SAN field of a certificate

I was doing a Nmap scan on the public network of the company that I work for. Using the script "-sC" I noticed that the scan showed the certificate, and in particular the SAN section. In ...
Antanix's user avatar

153050per page