Newest Questions

1vote
1answer
41views

How is SLSA compliance meant to be used? Is it something you're meant to advertise to end users?

I'm putting some effort to attain SLSA level 3 compliance for a closed source, direct to consumer software, and I'm wondering how folk communicate progress to the public. Is there some sort of ...
blueberryfields's user avatar
0votes
0answers
27views

Alternatives for device code flow for headless sign-in in azure cli?

With the ongoing phishing campaign storm-2372, targeting the device code flow for authentication, we would like to disable this flow for our users. However, the device code flow is essential for many ...
Petter Kvalvaag's user avatar
3votes
1answer
1kviews

Can a public certificate provider impersonate an AD?

I do not know much about how MS Windows interprets client certificates but I was faced with a statement I have a hard time integrating. The context: organization EXAMPLE has an Active Directory and an ...
WoJ's user avatar
  • 9,218
1vote
1answer
43views

Using OPAQUE without envelope checksums

I've been considering switching from SRP to OPAQUE, because I like the idea that verifiers (which can be subject to dictionary attacks) are never communicated over the protocol, even during ...
Dolda2000's user avatar
1vote
0answers
24views

Using database_to_xml in SQL Injection on PostgreSQL doesn't show data

we have found SQL injection on a PostgreSQL database. Stacked and UNION payloads. We have created a table to store data as needed and the UNION to extract either from the table or to pull out data ...
pee2pee's user avatar
1vote
0answers
73views

Should I restart or power off/on a phone to clear malware in volatile memory? [closed]

Several sources claim one should power off and on mobile devices weekly. While the effect on overall security might be minor it should (among other things) clear temporary files where malicious code ...
A-Tech's user avatar
1vote
0answers
46views

What are the acceptable ranges of MSE, MAE, and PSNR values in the context of image encryption? [migrated]

In my research on image encryption, I use the metrics below to evaluate the level of distortion between the original image ( I ) and its encrypted version ( I' ): MSE (Mean Squared Error) MAE (Mean ...
Karim's user avatar
1vote
1answer
59views

Exposing size of last chunk in RSA file encryption

So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
Maq's user avatar
  • 113
2votes
1answer
66views

Gpg key management - lost / forgotten keys

In my current pubring.kbx I found an old secret key with no expiry date set and its subkey, for that I have forgotten the passphrase. In the same file I have another better maintained key. I tried to ...
menuhin's user avatar
1vote
1answer
73views

How to map refresh token, stored server side in the client app, to a specific user?

My app so far was using only access tokens. And whenever the token expired, the user had to log-in again. That's the reason I want to start using refresh tokens. They can apparently be stored server ...
Václav Pruner's user avatar
2votes
1answer
121views

Is it okay to use an expired access token to look up its corresponding refresh token?

setup I have inherited this infrastructure setup app A handles the frontend. The server is very small and it mainly just calls app B. app B is an API server. It's both a resource server and the ...
Václav Pruner's user avatar
13votes
4answers
3kviews

Cryptographic strength of VeraCrypt

During the installation of VeraCrypt, the user chooses a password and is afterwards asked to move the mouse some time randomly over a field to increase the cryptographic strength of the generated ...
user120513's user avatar
1vote
1answer
77views

What are the risks of allowing outgoing traffic on all ports on a webserver? [duplicate]

If I have a webserver which allows outgoing traffic on all ports. What are the risks? I understand that incoming traffic should be limited to HTTPS, HTTP and other required ports for communication. I ...
lebicahl's user avatar
0votes
0answers
34views

Most secure method for a git workflow to reach another private github repo

I am working on multiple github workflows and these workflows need to reach other private repos within my organizations (these workflows might need to read and clone these repos or activate other ...
a_duck's user avatar
1vote
0answers
39views

How can you find out why passkeys failed? [closed]

Given that a passkey creation attempt fails, what are the steps one can take to identify the cause of the failure? It there a local log of browser passkey interaction? Is there a failure code ...
User65535's user avatar

153050per page