Most Popular

1500 questions
50
votes
10 answers

Is an SSH key with a passphrase a 2FA?

This is a really theoretical question, but if I use an SSH key with a passphrase to login on a server, could this be considered as a two-factor authentication (2FA)? Indeed, I need the SSH (private) key, which could be considered as the first…
Antonin M.
  • 611
  • 1
  • 5
  • 11
50
votes
4 answers

Log user out after change of IP address?

Does it make sense to log a user out from a web service after the user's IP address is changed? I understand that a change of an IP address might indicate a man-in-the-middle attack. Then again IP addresses of end user devices (mobile phones) might…
Tobias Gassmann
  • 611
  • 5
  • 5
50
votes
7 answers

Is this password scheme legit?

I received an invitation for an IT security fair (https://www.it-sa.de/en). They additionally delivered a password "Kryptonizer". That is a little card to hang on your keychain with the following (example values, my translation): It is often too…
izlin
  • 619
  • 1
  • 5
  • 7
50
votes
5 answers

Is using 'echo' to display attacker-controlled data on the terminal dangerous?

Imagine the following code: ATTACKERDATA="$(cat attackerControlledFile.txt)" echo "${ATTACKERDATA}" An attacker can, through whatever arbitrary process, modify the contents of attackerControlledFile.txt to anything they desire. The content can be…
user163495
50
votes
5 answers

Downsides of showing email address on Android lock screen

My stock Android 9.0 gives me the option of showing some short text message on the lock screen. I want to add my email address here, so people know how to contact me if they find my phone. Are there any downsides to this? The address is linked to…
freekvd
  • 463
  • 4
  • 6
50
votes
7 answers

Doesn't the choice of encryption algorithm add entropy by itself?

Let's say someone has my encrypted data and he wants to decrypt it. People always talk about how the length of the key (e.g. 256 bits) decides about the entropy of the encryption, which totally makes sense. If the attacker tries all 2256…
Robert
  • 617
  • 1
  • 5
  • 3
50
votes
21 answers

Are there unphotographable, but scannable ID cards?

We have a client who hosts an event, with a tight budget, that uses lanyarded Photo-ID cards with barcodes on them. The barcodes are used to gain access to various areas at the event. We were thinking of proposing a hashed code (currently the IDs…
Konchog
  • 615
  • 1
  • 5
  • 9
50
votes
10 answers

Is it OK that a sysadmin knows the password for a newcomer / act as a user (immediately after his/her recruiting)?

Somehow related to this other question. I am dealing with the following case: a medium-large company (with about 200 on-premises employees) is applying the following procedure for all the newly recruited employees (immediately before their first day…
Diego Pascotto
  • 601
  • 1
  • 5
  • 5
50
votes
5 answers

Can someone without the WiFi login and no physical access to a router still access it with the admin login?

If you have a router with default login and password for the admin page, can a potential hacker gain access to it without first connecting to the LAN via the WiFi login?
Q-bertsuit
  • 537
  • 1
  • 4
  • 7
50
votes
4 answers

How to achieve non-repudiation?

If I have a message that I need to send to another person, how do I achieve non repudiation ? Is digitally signing the message sufficient ?
50
votes
6 answers

How safe are wifi enabled talking toys?

There have been ads on the radio recently for a wifi enabled toy called Talkies, which are advertised as being able to communicate with app enabled phones, with a "trusted circle" that other phones can be added to. (Obligatory photo of a cute wifi…
JohnP
  • 611
  • 1
  • 6
  • 11
50
votes
11 answers

SSL's (security) benefit to the website owner

I know the many benefits of SSL for the users of a website. It creates a contract whereby the user can be certain that the entity they're transacting with is who it claims to be and that the information passed is encrypted. I also have some idea…
Luke Sawczak
  • 650
  • 5
  • 9
50
votes
6 answers

Is there any difference between HTTP and HTTPS when using my home / own internet connection

First of all I am a web developer and not a security expert. I have read lots of articles about the difference between HTTPS and HTTP, including this site. The basic idea I got from them is, when using HTTPS all things are encrypted on the client…
50
votes
5 answers

New XSS cheatsheet?

There is a great list of XSS vectors avaliable here: http://ha.ckers.org/xss.html, but It hasn't changed much lately (eg. latest FF version mentioned is 2.0). Is there any other list as good as this, but up to date?
naugtur
  • 1,115
  • 2
  • 12
  • 15
50
votes
4 answers

How to approach replacing md5 for transporting Unity game data to a remote server

TL;DR I am working on a gaming system that uses UnityScript and C# on the client and PHP on the server. A MD5 hash of the data plus a shared secret is used to check that the data has not been modified in transit. Is MD5 good enough for this? What…
Martin
  • 1,057
  • 1
  • 11
  • 19