Newest Questions
69,928 questions
5votes
0answers
186views
Why ProtonDrive uses so many layers of encryption that looks redundant
I read their security model which explains how they laid out all these layers. https://proton.me/blog/protondrive-security Files and folders are structured in a tree and called nodes. Each node (file/...
3votes
1answer
3kviews
Are there any security concerns with this authentication flow?
I’m in the process of developing a native app and am currently trying to come up with a workflow to secure the communication between my app and the server. I’ve done a lot of research and have not ...
0votes
1answer
41views
Why hide the access token from the User Agent? (OAuth Authorization Code Grant)
My understanding is that the OAuth Authorization Code Flow is used to avoid exposing the access token from the User Agent. But why? I was reading this article (Common OAuth Vulnerabilities) by ...
0votes
1answer
51views
When not to use Authorization Code Grant?
Why would an OAuth implementation choose to use the Authorization Code Grant -- when it means that the access tokens are leaked to a third party? I've been using API keys for a package on my server to ...
0votes
0answers
71views
How to assess poor OAuth security implementations?
What questions should I ask to determine if a given OAuth implementation is secure? I've been using a wordpress plugin for payments that authenticates with the payment gateway with an API key. I like ...
1vote
1answer
151views
What is the proper way of starting an HTTP-only reverse shell using Chisel?
My lab has these restrictions: 1. Inbound and Outbound HTTP connections are allowed from CONFLUENCE01. 2. For Non-HTTP connections, only inbound TCP is allowed at port 8090 of CONFLUENCE01. 3. ...
0votes
0answers
19views
Problem with windows smart card authentication restrictions [migrated]
I am running an Octoprint server for my organization and I restrict access to it by smart card client certificates. This works fine for accessing the web interface in a browser as well as the "...
0votes
1answer
68views
How to stop a mobile operator from using a dial tone that indicates I am in a different country? [closed]
When I travel abroad, people who dial my (British) mobile number hear a calling tone different to what they would have heard if I am home. I do not want everyone who calls me to know I am unlikely to ...
6votes
4answers
2kviews
Hashing security question answers for bank account portal activation
I'm working on financial software in which at some point in the process, we send users an email to initiate their portal onboarding. The email contains a hyperlink along with a token. We already have ...
2votes
0answers
74views
Is a write-cache in my Synology NAS exposing unencrypted data?
I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache. When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD? Do ...
12votes
3answers
3kviews
Why shred before LUKS disk encryption?
I read the following article and it says to "Stuff random data to the device" (using shred) before encrypting with LUKS. How to enable LUKS disk encryption with keyfile on Linux Why would ...
0votes
1answer
93views
Why use the data protection classes of iOS
According to https://support.apple.com/en-ca/guide/security/secb010e978a/web: If a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data on an iPhone, iPad,...
0votes
0answers
92views
Am I experiencing a DNS leak?
I’m using ExpressVPN on my Mac. My Little Snitch firewall is showing that several applications, including my browser and a process called expressvpnd, are making requests to DNS servers set by my ISP. ...
-1votes
2answers
195views
Is it safe to use the public IP of players as the identity in a website between players?
Suppose I create a game in my website. No registration and no login required. It's all based on public IP of people accessing my site. I gave credit to them based on IP reputation to prevent spam ...
0votes
0answers
10views
Does generating a vanity ED25519 key pair reduce security [migrated]
I found tools that bruteforce ssh ed25519 key pairs to include specific text in the public key, but none of them mention the security implications. Right now im thinking that if i could generate the ...