Newest Questions

5votes
0answers
186views

Why ProtonDrive uses so many layers of encryption that looks redundant

I read their security model which explains how they laid out all these layers. https://proton.me/blog/protondrive-security Files and folders are structured in a tree and called nodes. Each node (file/...
Dana v's user avatar
3votes
1answer
3kviews

Are there any security concerns with this authentication flow?

I’m in the process of developing a native app and am currently trying to come up with a workflow to secure the communication between my app and the server. I’ve done a lot of research and have not ...
Rhubarb's user avatar
0votes
1answer
41views

Why hide the access token from the User Agent? (OAuth Authorization Code Grant)

My understanding is that the OAuth Authorization Code Flow is used to avoid exposing the access token from the User Agent. But why? I was reading this article (Common OAuth Vulnerabilities) by ...
Michael Altfield's user avatar
0votes
1answer
51views

When not to use Authorization Code Grant?

Why would an OAuth implementation choose to use the Authorization Code Grant -- when it means that the access tokens are leaked to a third party? I've been using API keys for a package on my server to ...
Michael Altfield's user avatar
0votes
0answers
71views

How to assess poor OAuth security implementations?

What questions should I ask to determine if a given OAuth implementation is secure? I've been using a wordpress plugin for payments that authenticates with the payment gateway with an API key. I like ...
Michael Altfield's user avatar
1vote
1answer
151views

What is the proper way of starting an HTTP-only reverse shell using Chisel?

My lab has these restrictions: 1. Inbound and Outbound HTTP connections are allowed from CONFLUENCE01. 2. For Non-HTTP connections, only inbound TCP is allowed at port 8090 of CONFLUENCE01. 3. ...
Wonjae Oh's user avatar
0votes
0answers
19views

Problem with windows smart card authentication restrictions [migrated]

I am running an Octoprint server for my organization and I restrict access to it by smart card client certificates. This works fine for accessing the web interface in a browser as well as the "...
user310577's user avatar
0votes
1answer
68views

How to stop a mobile operator from using a dial tone that indicates I am in a different country? [closed]

When I travel abroad, people who dial my (British) mobile number hear a calling tone different to what they would have heard if I am home. I do not want everyone who calls me to know I am unlikely to ...
user19273's user avatar
6votes
4answers
2kviews

Hashing security question answers for bank account portal activation

I'm working on financial software in which at some point in the process, we send users an email to initiate their portal onboarding. The email contains a hyperlink along with a token. We already have ...
nogridbag's user avatar
2votes
0answers
74views

Is a write-cache in my Synology NAS exposing unencrypted data?

I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache. When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD? Do ...
Daniel W.'s user avatar
12votes
3answers
3kviews

Why shred before LUKS disk encryption?

I read the following article and it says to "Stuff random data to the device" (using shred) before encrypting with LUKS. How to enable LUKS disk encryption with keyfile on Linux Why would ...
AlanQ's user avatar
0votes
1answer
93views

Why use the data protection classes of iOS

According to https://support.apple.com/en-ca/guide/security/secb010e978a/web: If a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data on an iPhone, iPad,...
ArcticMeltdown's user avatar
0votes
0answers
92views

Am I experiencing a DNS leak?

I’m using ExpressVPN on my Mac. My Little Snitch firewall is showing that several applications, including my browser and a process called expressvpnd, are making requests to DNS servers set by my ISP. ...
Curious-Programmer's user avatar
-1votes
2answers
195views

Is it safe to use the public IP of players as the identity in a website between players?

Suppose I create a game in my website. No registration and no login required. It's all based on public IP of people accessing my site. I gave credit to them based on IP reputation to prevent spam ...
Muhammad Ikhwan Perwira's user avatar
0votes
0answers
10views

Does generating a vanity ED25519 key pair reduce security [migrated]

I found tools that bruteforce ssh ed25519 key pairs to include specific text in the public key, but none of them mention the security implications. Right now im thinking that if i could generate the ...
aeterna's user avatar

153050per page