Skip to main content

All Questions

Tagged with
0 votes
0 answers
98 views

User-Controlled Encryption in web app. How to Implement Encrypted Content Sharing Among Friends?

I'm working on idea for a project the goal is to allow a user to share their encrypted content with friends while ensuring the server and none friends maintains zero knowledge of the actual content. ...
Reed Jones's user avatar
1 vote
3 answers
543 views

Can Windows invade my privacy by accessing files from my Linux OS?

I have a 500 GB SSD drive with Windows 10 installed, and a 250 GB SSD drive with Ubuntu 22.04 installed. I use the latter mainly to maintain my privacy; Ubuntu is like my personal computer, with ...
Best Quality Vacuum's user avatar
15 votes
4 answers
4k views

How can we determine if there is actual encryption and what type of encryption on messaging apps?

There are many new messaging apps that claim to be the most secure. How can we be certain if there is actual encryption and what type of encryption? Molly, signal, WhatsApp, briar, wire, telegram, ...
Private Guy's user avatar
0 votes
1 answer
145 views

If software use encryption to protect one from ISP providers and other parties from snooping, how does this apply to browser software, esp. on mobile?

I believe the title says it all. As an example, let's say I use the Brave browser on a phone. From my understanding, all legitimate apps or computer software that connect to the Internet have some ...
Kyrill's user avatar
  • 1
21 votes
9 answers
10k views

Need to leave computer in repair shop. How can I secure solid state drive contents?

I need to take my desktop into a PC repair shop and leave it for a few days. It would be easy for them to copy the drives without me knowing. I am running Windows 10 with a password but this doesn't ...
JohnD's user avatar
  • 441
1 vote
1 answer
583 views

Can my ISP or government listen to my Skype calls?

Is the call encrypted with something like HTTPS to prevent a corrupt government (or ISP) from messing with the DNS routing, sniffing, snooping etc? Can my ISP or government listen to my Skype calls? I'...
user274772's user avatar
3 votes
2 answers
2k views

Should bank details such as bank bic code, bank swift code, bank cc, bank code be considered as personal data and does it need to be encrypted?

I wanted to understand what elements of financial information need to be protected/encrypted. Understand that information like IBAN, bank account name, bank account number are personal data and need ...
Sonia Mishra's user avatar
4 votes
2 answers
1k views

How does Windows password protect my data?

As far as I know, Windows computers are not encrypted by default in case you are not signed into a Microsoft Account. Considering the aforementioned fact I cannot understand the purpose of the login ...
Allan VanDaalen's user avatar
0 votes
1 answer
725 views

What's The Best PHP Encryption For Email Addresses?

I'm storing a list of email addresses and other not personally identifiable information for a mailing list in a database. Since it's for a project related to cryptocurrency, I believe that the ...
azoundria's user avatar
  • 763
0 votes
0 answers
145 views

Is it safe to use a Digital Signature created with a PKI certificate's private key as a password

I'm trying to create application-layer encryption for user data in my database, using password derivation function. But there is a problem, that there must be an admin user, who can access all user's ...
Владимир Лопаткин's user avatar
1 vote
1 answer
146 views

How can I improve the application administrator's encryption keys security inside database

I am interested in the issue of establishing the security of data of users of a web application in the event of a database leak. It was decided to use the following encryption chain: User data is ...
Владимир Лопаткин's user avatar
0 votes
1 answer
209 views

Taking encrypted devices across borders

I am moving to a country where the government can compel you to reveal passwords for your devices at the border, rendering the full disk encryption on my linux laptop useless. Other than uploading ...
devilindetailz's user avatar
3 votes
1 answer
1k views

Difference between Tor over VPN and VPN over Tor

I saw many posts here saying that Tor over VPN is different from VPN over Tor, and one is better than other, but I was unable to find any explanation over it. There were some speculations that you ...
Sourav Singh's user avatar
0 votes
1 answer
133 views

Ways to encrypt data that will be available to specific clients [closed]

I want to store information on the blockchain, but some part of it is private and must be available to selected clients (for example, users who belong to a common company) How can this be done? The ...
Wen Chiang's user avatar
3 votes
2 answers
4k views

What is Trusted Credentials in mobile phones?

My phone is encrypted and i was just playing with the configuration and just found a Trusted Credentials that got me curious on what it is and specially in one called Government Root Certification ...
Rafael Soares's user avatar

15 30 50 per page
1
2 3 4 5
12