Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.

0 votes
2 answers
150 views

Is it possible to send data from an open-source program but make it impossible for a user with source code to do the same?

If I want to store a global scoreboard for a game running locally on the user's computer and I want to make sure that all the requests coming to the server are really generated by the game and not ...
Reverent Lapwing's user avatar
1 vote
1 answer
61 views

Allow one of many encryption/signature algorithms for single public key certificate

Let's say a user creates their primary gpg key pair for User Name <[email protected]> and selects an encryption and signing algorithm that isn't widely available (think goldilocks). For instance, ...
aackmann's user avatar
0 votes
1 answer
105 views

Encryption without a classic exchange scenario

I am working on a project where I need to securely encrypt and decrypt files on a product without the ability for direct communication or key derivation after the product is sold. The challenge is ...
mrx's user avatar
  • 1
0 votes
0 answers
88 views

What are the effective open-source methods for storing and managing encryption keys in a language-agnostic manner when an HSM is unavailable?

When HSMs are not accessible, we often need alternative methods for securely storing and managing encryption keys What open-source options exist for effectively managing encryption keys in a language-...
SSpirate's user avatar
0 votes
1 answer
102 views

Since devices in typical house scenario are exposed to ISP, Do anonimous OS (tails/kodachi/etc) require a different scenario to keep anonymity?

Researching on this topic I found the answer of Conor Mancone for a similar question about whether Can an ISP detect or log specific devices connected to ISP-provided home routers?, which answer was ...
Zyncho's user avatar
  • 101
0 votes
1 answer
271 views

Is the Bitlocker encryption key used on HD same for USB?

With Bitlocker, is there only one "master key" that is used to encrypt/decrypt for both HD and USB data? I saw this article today which talks about sniffing the encryption key to get access ...
nanonerd's user avatar
  • 197
0 votes
1 answer
215 views

Passwords/password hashes in plaintext in service configs - why is this common practice?

A while ago I wanted to deploy a service using a OCI (docker/podman) container, and I noticed to me, what seemed like a possibly distributing trend. In the build file for a lot of the containers, the ...
The Floating Brain's user avatar
2 votes
1 answer
161 views

Securely storing derived key in web app and handling user identity

I am currently working on an open source project to securely store notes, payment card numbers, etc. I would like to implement a zero knowledge encryption method so that no one but the user can ...
mson's user avatar
  • 23
1 vote
0 answers
138 views

Encryption of calls and files in XMPP

I use Conversations, and my interlocutor is Monal (or another application for iOS (you can tell which is better)). I plan to use OMEMO for encryption. Are files and photos encrypted or not? Are calls ...
hhf's user avatar
  • 11
1 vote
2 answers
121 views

Authenticating a device for remote motor control

I'm looking for a standard solution to the following problem. I've been unable to find how something like this is normally accomplished. Even a key word that points me in the right direction would be ...
Joseph Rappaport's user avatar
0 votes
2 answers
309 views

Is encrypting a query parameter within a URI a security best practice?

Assumption a customer is sitting in a public area connected to a public wifi. A threat actor can access the customer's browser and read all Javascript variables. Step 1. example.com server sends the ...
user1068636's user avatar
1 vote
2 answers
234 views

How can I encrypt a string of text so I can write it on paper?

How can I encrypt a string of information and put it on a piece of paper and be able to plug that encrypted text back into the algorithm with a password and unlock the information? Is this secure?
prestonferry's user avatar
0 votes
1 answer
95 views

Assembly routine for AES CBC encrypt

I'm assuming that OpenSSL is just using these functions here. page 66 is CBC https://www.intel.com/content/dam/develop/external/us/en/documents/aes-wp-2012-09-22-v01-165683.pdf Can I just generate a ...
shawnixer's user avatar
0 votes
0 answers
69 views

Assessing the Implications of Using msoffcrypto for Open Sourcing a Medical Data Processing Pipeline

I am in the process of creating a Python pipeline intended for reading and processing sensitive medical personal data from password-protected Excel files. The pipeline utilizes the msoffcrypto library,...
Eoin's user avatar
  • 1
2 votes
1 answer
353 views

What is the main difference between bcprov and bc-fips (bouncycastle) jar?

I am having difficulty understanding the differences between bc-prov and bc-fips jar. I understand bc-fips contains the subset of bc-prov packages as well. But I want to understand more about the ...
Kiran Reddy's user avatar

15 30 50 per page