Most active questions

29 questions from the last 7 days
10votes
2answers
3kviews

What are the preferred ways to exchange public keys physically?

Suppose I have the privilege to being able to physically meet a person that I want to communicate with beforehand. Suppose the person and I have minimal trust --- it could be the first time we get to ...
Guanyuming He's user avatar
9votes
3answers
2kviews

Overlap for One-Time Passwords

I've got multiple OTP managers on my telephone. All of them seem to work with a constant timeout on the one-time passwords that are generated. For instance, the Microsoft authenticator works using a 6-...
Maarten Bodewes's user avatar
5votes
2answers
1kviews

Accessing a database publicly via HTTPS API vs. native but with client certificates

There are database services offering access to the database via a HTTPS API, such as Neon and Algolia. This is great for serverless environments, but from a security standpoint, I’m curious if this ...
Vitor Figueredo Marques's user avatar
3votes
2answers
865views

Hiding information in the SAN field of a certificate

I was doing a Nmap scan on the public network of the company that I work for. Using the script "-sC" I noticed that the scan showed the certificate, and in particular the SAN section. In ...
Antanix's user avatar
4votes
2answers
656views

Are truncated SHA-256 hashes safe enough when collisions are not a risk?

Apologies if this is a duplicate, I’m having trouble even to find the right words for it. As far as I am aware, password authentication usually works in a way that the server stores a hash of the ...
cdauth's user avatar
3votes
2answers
696views

Are client certificates a secure way of having publicly facing SQL database?

Quick Context: I often come across videos where people build apps using SQL database services alongside serverless functions (like AWS Lambda, Vercel, and others) without setting up a VPC to keep the ...
Vitor Figueredo Marques's user avatar
2votes
1answer
127views

Extract CRT and KEY from signed PEM file without the openssl tool

Is there any way to extract a private key from a PEM file without the openssl tool on Windows? Windows MMC won't do the trick as I cannot export to PKCS#12 due to my work laptop security restrictions ...
mortirolo's user avatar
2votes
1answer
177views

For the same private key, I have two slightly different public keys. Is it normal?

I have two servers, and I want one to talk to the other. Lets call them alpha and beta, where alpha wants to talk to beta. On alpha, I have created an RSA key pair : private key and public key. I use ...
leftcursor's user avatar
0votes
1answer
63views

Is using software without buying all available patches against security standards?

Canonical, the publishers of Ubuntu, create their own set of security patches for packages in Ububtu's "universe" repository of community-maintained software. They make these patches ...
interfect's user avatar
1vote
1answer
92views

Is it safe to publish encrypted secrets in a git repository?

Tools like Ansible Vault, CNCF SOPS or Chezmoi make it easiy to keep secrets encrypted in version control, so that you can publish the repository, but still use the secrets inside when deploying. This ...
Tyler's user avatar
-3votes
0answers
92views

How to know whether a plate number is being faked or not? [closed]

I’m not sure whether this question fits better under AI, Cryptography, or Security. I’ll place it under Security for now, since AI Security has become a new and growing domain. I have developed an ...
Muhammad Ikhwan Perwira's user avatar
0votes
0answers
51views

Sanity check on how bad my router's VPN is [closed]

I have a TP-Link AX73 router. It was initially released in 2020. This router has VPN server functionality that allows me to connect to my home network when away from home. However, as far as I can ...
Stephen's user avatar
1vote
0answers
73views

CTF finding flag in an image [closed]

I'm trying to solve this ctf challenge: (Category - Misc), Description: "In the neon-soaked streets of Helix City, an underground courier group called the Neon Runners uses glitched billboards ...
Covid 19's user avatar
2votes
0answers
61views

Impossible optimization in IKE Intermediate RFC?

RFC 9242 - Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2) describes a new IKEv2 exchange type called "IKE_INTERMEDIATE". The purpose of this type is to allow ...
hakoja's user avatar
3votes
1answer
29views

How to migrate an OLD Yubikey with an OLD PGP key to a NEW Yubikey with a NEW PGP Key? Cross-signing, certifying, etc

A few years ago, I set up my Yubikey with PGP by following Dr.Duhs Yubikey Guide. I created an offline Certify key / Master key on a live usb distro, and then created the corresponding sub keys (S,A,E)...
DanRan's user avatar

153050per page