Newest Questions
69,926 questions
0votes
0answers
3views
Are secrets from automatically unlocked keychain in Ubuntu 24.04 Seahorse accessible for any application?
I am familiarizing with Ubuntu 24.04 and Seahorse. I recently connected to a password-protected network drive, and the password is now stored in my "login" keyring, which is encrypted with ...
0votes
0answers
7views
LinkedIn website automatically gets my email address in Edge without consent, can all websites I browse silently get my email? [migrated]
I'm using Edge 135 browser on Windows 10. I am currently logged in my Gmail account, but not logged in LinkedIn. When browsing to https://www.linkedin.com (I never logged in on this website since I ...
0votes
0answers
17views
For AES-GCM, why do protocols not use the nonce to prevent replay attacks? [migrated]
For protocols using AES-GCM, it appears to be common practice to store the sequence number in the additional authenticated data (AES_GCM and TLS sequence number). I have not found any instances of ...
2votes
0answers
54views
Impossible optimization in IKE Intermediate RFC?
RFC 9242 - Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2) describes a new IKEv2 exchange type called "IKE_INTERMEDIATE". The purpose of this type is to allow ...
-3votes
0answers
87views
How to know whether a plate number is being faked or not? [closed]
I’m not sure whether this question fits better under AI, Cryptography, or Security. I’ll place it under Security for now, since AI Security has become a new and growing domain. I have developed an ...
2votes
1answer
122views
Extract CRT and KEY from signed PEM file without the openssl tool
Is there any way to extract a private key from a PEM file without the openssl tool on Windows? Windows MMC won't do the trick as I cannot export to PKCS#12 due to my work laptop security restrictions ...
0votes
0answers
21views
How can I stop C code from debugging while it's being compiled using GCC? [closed]
These days, software programs on the internet have a number of security features. These are taken seriously by the most fundamental reverse engineers, who use them to demonstrate that the codes are ...
0votes
0answers
28views
Can my work see my BitTorrent downloads on a personal device when logged into the company WiFi? [closed]
A slightly paranoid post here. I have a BitTorrent client running on my phone which was downloading some adult content. Stupidly, I left it running when I went to work. When we connect to my works ...
0votes
0answers
24views
Creating a pentester tool in c/c++ that's used for controlled sections like bug bounty programs? [closed]
I have been looking for some code to help me do it. Can anyone help me get it done? I have the following code: if [ -z "$1" ]; then echo "Uso: ./ReaperScan.sh <ip>" exit ...
3votes
1answer
29views
How to migrate an OLD Yubikey with an OLD PGP key to a NEW Yubikey with a NEW PGP Key? Cross-signing, certifying, etc
A few years ago, I set up my Yubikey with PGP by following Dr.Duhs Yubikey Guide. I created an offline Certify key / Master key on a live usb distro, and then created the corresponding sub keys (S,A,E)...
0votes
0answers
18views
Issues consuming HTTP FastAPI from HTTPS-embedded widget (frontend fetch)
How can I make a frontend widget on HTTPS communicate with an HTTP FastAPI backend without CORS or mixed content issues? I'm building a chatbot widget that's embedded into a website served over HTTPS. ...
0votes
0answers
23views
Checkmarx seeing vulnerabilities in DLL files but the package has already been updated
I'm checking .NET app. Checkamrx is saying that the package System.Drawing.Common 4.7.0 is vulnerable. So what the dev did, they updated it using the NuGet package manager so I'm guessing it's gonna ...
4votes
2answers
649views
Are truncated SHA-256 hashes safe enough when collisions are not a risk?
Apologies if this is a duplicate, I’m having trouble even to find the right words for it. As far as I am aware, password authentication usually works in a way that the server stores a hash of the ...
10votes
2answers
3kviews
What are the preferred ways to exchange public keys physically?
Suppose I have the privilege to being able to physically meet a person that I want to communicate with beforehand. Suppose the person and I have minimal trust --- it could be the first time we get to ...
3votes
2answers
860views
Hiding information in the SAN field of a certificate
I was doing a Nmap scan on the public network of the company that I work for. Using the script "-sC" I noticed that the scan showed the certificate, and in particular the SAN section. In ...