All Questions
Tagged with encryption network
169
questions
0
votes
2
answers
150
views
Is it possible to send data from an open-source program but make it impossible for a user with source code to do the same?
If I want to store a global scoreboard for a game running locally on the user's computer and I want to make sure that all the requests coming to the server are really generated by the game and not ...
0
votes
3
answers
620
views
Why do most VPN protocols work on the Transport Layer and not on the Network Layer instead?
In both the TCP/IP model and the OSI model, IPSEC offers encryption on the Network Layer (IP), while other VPN protocols such as OpenVPN offer it on the Transport Layer (TCP).
Due to encapsulation ...
1
vote
1
answer
270
views
Why is TLS communication within a VPC important? [duplicate]
In this sense, I understand the encryption needed between say client and server and all communications that are external.
But for a scenario where for all VMs are in the same VPC and not exposed to ...
0
votes
2
answers
138
views
Encryption on IP Tables network Gateway
I have created a network gateway on an Ubuntu server. It has 2 interfaces and forwards the traffic from one interface to another. One of the interfaces is connected with a pfsense firewall that ...
1
vote
2
answers
242
views
Recommended temporary key size for communication
What I'm going to do is use AES-256 encrypted network communication to agree upon a pseudo-random key for further communications between two peers, so that every "session" utilizes a ...
0
votes
0
answers
128
views
Can I send confidential information in plain text via an HTTPS POST method?
I have a web app that collects user SSN and driver license number. A POST API via HTTPS send the data to the server. Can I use plain text to transfer the data? Is it safe enough? Is it in accordance ...
0
votes
2
answers
2k
views
TLS1.3 handshake encryption
I was reading about TLS1.3 and my question is that are the server hello extensions encrypted? Why is it so and how are they encrypted?
2
votes
1
answer
217
views
Is this TCP socket encryption and password storage implementations secure enough?
I'd like to know if this communication technique is secure enough against attacks, both on the connection itself and the password-storing procedures.
Both the client and the server have access to 2 ...
3
votes
1
answer
444
views
Same network steal data?
Say my home network has a wifi-password and my friends are connected to it (since I gave them my wifi-password).
Is it possible for me to read their data transfer?
If yes, then it would also be ...
0
votes
0
answers
163
views
Spoofing a server to intercept my IoT device's data
I'm trying to reverse engineer a power meter I've installed to integrate with HomeAssistant. It sends its data to a remote server, where I can log into a UI to view its data. Additionally, they have a ...
-1
votes
2
answers
224
views
Can a device that connected to malicious network once be compromised even after disconnection from malicious WiFi?
I need to take my personal laptop to the workplace so I will be using their internet that only employees usually use. However, if the network I connected to was malicious, is my data only compromised ...
0
votes
1
answer
164
views
How to encrypt http traffic in an offline enterprise network?
I am building a golang offline application for a company that will operate in their office internal Wireless / Wired Network.
There will be one server computer and many client computers communicating ...
0
votes
0
answers
22
views
How likely is it that publicly available data will be decrypted in the future? [duplicate]
As we already know, with the rising power of machines and new technologies like quantum computers today's methods of encryption might be much faster to crack in the future.
With locally saved data you ...
0
votes
2
answers
381
views
How easily can ISP/mobile network operator employees read or decode traffic data?
When I sign up for a mobile subscription or internet connection with my ISP (also a mobile network operator), the company's privacy policy says that certain information is processed such as personal ...
3
votes
1
answer
2k
views
How dangerous is Code With Me, a remote pair programming tool from Jetbrains?
I've been looking into this very useful remote pair programming plugin from JetBrains called Code With Me, but want to understand all the security implications.
From their FAQ page:
How is data ...