Skip to main content

All Questions

Tagged with
0 votes
2 answers
150 views

Is it possible to send data from an open-source program but make it impossible for a user with source code to do the same?

If I want to store a global scoreboard for a game running locally on the user's computer and I want to make sure that all the requests coming to the server are really generated by the game and not ...
Reverent Lapwing's user avatar
0 votes
3 answers
620 views

Why do most VPN protocols work on the Transport Layer and not on the Network Layer instead?

In both the TCP/IP model and the OSI model, IPSEC offers encryption on the Network Layer (IP), while other VPN protocols such as OpenVPN offer it on the Transport Layer (TCP). Due to encapsulation ...
Bob Ortiz's user avatar
  • 6,715
1 vote
1 answer
270 views

Why is TLS communication within a VPC important? [duplicate]

In this sense, I understand the encryption needed between say client and server and all communications that are external. But for a scenario where for all VMs are in the same VPC and not exposed to ...
Vipin Menon's user avatar
0 votes
2 answers
138 views

Encryption on IP Tables network Gateway

I have created a network gateway on an Ubuntu server. It has 2 interfaces and forwards the traffic from one interface to another. One of the interfaces is connected with a pfsense firewall that ...
Kostas's user avatar
  • 1
1 vote
2 answers
242 views

Recommended temporary key size for communication

What I'm going to do is use AES-256 encrypted network communication to agree upon a pseudo-random key for further communications between two peers, so that every "session" utilizes a ...
R-Rothrock's user avatar
0 votes
0 answers
128 views

Can I send confidential information in plain text via an HTTPS POST method?

I have a web app that collects user SSN and driver license number. A POST API via HTTPS send the data to the server. Can I use plain text to transfer the data? Is it safe enough? Is it in accordance ...
BurgerBurglar's user avatar
0 votes
2 answers
2k views

TLS1.3 handshake encryption

I was reading about TLS1.3 and my question is that are the server hello extensions encrypted? Why is it so and how are they encrypted?
Komal's user avatar
  • 3
2 votes
1 answer
217 views

Is this TCP socket encryption and password storage implementations secure enough?

I'd like to know if this communication technique is secure enough against attacks, both on the connection itself and the password-storing procedures. Both the client and the server have access to 2 ...
Eduardo's user avatar
  • 23
3 votes
1 answer
444 views

Same network steal data?

Say my home network has a wifi-password and my friends are connected to it (since I gave them my wifi-password). Is it possible for me to read their data transfer? If yes, then it would also be ...
ZPlaya7's user avatar
  • 33
0 votes
0 answers
163 views

Spoofing a server to intercept my IoT device's data

I'm trying to reverse engineer a power meter I've installed to integrate with HomeAssistant. It sends its data to a remote server, where I can log into a UI to view its data. Additionally, they have a ...
Breina's user avatar
  • 101
-1 votes
2 answers
224 views

Can a device that connected to malicious network once be compromised even after disconnection from malicious WiFi?

I need to take my personal laptop to the workplace so I will be using their internet that only employees usually use. However, if the network I connected to was malicious, is my data only compromised ...
realnovice's user avatar
0 votes
1 answer
164 views

How to encrypt http traffic in an offline enterprise network?

I am building a golang offline application for a company that will operate in their office internal Wireless / Wired Network. There will be one server computer and many client computers communicating ...
Harsh Agarwal's user avatar
0 votes
0 answers
22 views

How likely is it that publicly available data will be decrypted in the future? [duplicate]

As we already know, with the rising power of machines and new technologies like quantum computers today's methods of encryption might be much faster to crack in the future. With locally saved data you ...
BooleanAssange's user avatar
0 votes
2 answers
381 views

How easily can ISP/mobile network operator employees read or decode traffic data?

When I sign up for a mobile subscription or internet connection with my ISP (also a mobile network operator), the company's privacy policy says that certain information is processed such as personal ...
Francis's user avatar
  • 51
3 votes
1 answer
2k views

How dangerous is Code With Me, a remote pair programming tool from Jetbrains?

I've been looking into this very useful remote pair programming plugin from JetBrains called Code With Me, but want to understand all the security implications. From their FAQ page: How is data ...
Fetus's user avatar
  • 143

15 30 50 per page
1
2 3 4 5
12