Skip to main content

All Questions

Tagged with
2 votes
1 answer
119 views

Can I add salt to my salt for password hash? [duplicate]

Following this tutorial, I got a bunch of questions with this code : const crypto = require("crypto") async function hash(password) { return new Promise((resolve, reject) => { ...
Franco RATOVOSON's user avatar
4 votes
1 answer
462 views

Find password decryption used in MSSQL

I have the 2 encrypted passwords in my MSSQL database and I'm trying to decrypt it. Here's one of the encrypted password: E4-68-3F-BE-91-CC-BE-B9-27-4B-18-B1-5F-1B-39-66 The password to the above ...
Elaine Byene's user avatar
0 votes
0 answers
69 views

Assessing the Implications of Using msoffcrypto for Open Sourcing a Medical Data Processing Pipeline

I am in the process of creating a Python pipeline intended for reading and processing sensitive medical personal data from password-protected Excel files. The pipeline utilizes the msoffcrypto library,...
Eoin's user avatar
  • 1
0 votes
1 answer
342 views

Verification of Password without Storing Hash - Security Considerations

Question: I am working on a password-based file encryption and decryption system in Python using the PBKDF2 key derivation function and Fernet encryption. I have a specific requirement: I want to ...
Patrickliu's user avatar
0 votes
0 answers
127 views

Choosing Encryption Strategies for Secure Long-Term Storage of Sensitive Data

When considering external drives for secure long-term storage of sensitive data, what are the pros and cons of using the same password for encrypting all files versus using random passwords for each ...
S. G.'s user avatar
  • 173
1 vote
1 answer
124 views

Key Hash With Securely-Optimal Setting : For Encryption vs For Password

Do you have to make a key hash with securely-optimum setting (eg. 100MB memlimit, 3 opslimit) for encryption ? So I'm making a text encryption function with javascript, using XChaCha20-Poly1305 and ...
Agus Setiawan's user avatar
0 votes
3 answers
436 views

Password managing apps seem to have access to my passwords

Keeper used to be free so I had stored most of passwords on that app a few years ago from a past device. When I tried to access the passwords after five years, the app had turned into a subscription ...
Jason Song's user avatar
0 votes
1 answer
172 views

Security of using Yubikey to derive Diceware password?

I bought a new Yubikey, and am currently setting it up to use on my desktop PC. Previously the PC was secured with password only, and I'd like to use the Yubikey as an alternative: instead of using ...
Danya02's user avatar
  • 373
5 votes
2 answers
8k views

How does Google's "on-device encryption" work?

I use Google to store some of my passwords and I noticed a "On-Device encryption" option in Google Chrome settings, that I had disabled. From what I understood, by allowing this, the ...
user10099's user avatar
  • 155
0 votes
1 answer
137 views

How do password protected files differ from keygen protected software?

From some posts I read here: Regarding keygen protected software: As long as the user has full control of the hardware where the software is running on (i.e. typical PC) it is impossible to fully ...
frt132's user avatar
  • 3
2 votes
1 answer
279 views

RAR archive password recovery

Hello guys is there some tool or methodic to get into let's say 12 years old RAR file. I tried Kraken CMD tool and dictionary attack but it will take ages goes through all passwords. Unfortunately for ...
James Kane's user avatar
1 vote
3 answers
367 views

Asymmetric encryption of user's data

I got to thinking this morning over my coffee, that it would be nice if I could encrypt data for a Tenant with one key, and decrypt it with another key. In such a way that only a logged in User can ...
Eloff's user avatar
  • 115
1 vote
1 answer
146 views

Does Google share it's international database of search queries with LEA agencies for purposes of breaking encryption?

So, suppose a person accidentally typed their complex encryption password into Google search. They weren't logged in to any Google services so the search was anonymous, and they continued to use this ...
Valeriano's user avatar
2 votes
1 answer
855 views

Is the Web Crypto API secure when the server is trusted?

I've heard a lot of people say that the Web Crypto API is not very safe. For example: https://tonyarcieri.com/whats-wrong-with-webcrypto, Problems with in Browser Crypto. However, I'm looking to use ...
asdf3.14159's user avatar
1 vote
0 answers
118 views

Why is not there encrypted way of sharing/showing data such as Password to the user (hidden from web app Source code)?

I wonder if there will be (or is) a way to hide data such as passwords from the HTML/DOM structure? As, password fields can hide from external person other than the main user with something like "...
BirukTes's user avatar

15 30 50 per page
1
2 3 4 5
28