Skip to main content
Limit's user avatar
Limit's user avatar
Limit's user avatar
Limit
  • Member for 8 years, 3 months
  • Last seen more than a month ago
57 votes
Accepted

Copying the email address to a forgotten password page

15 votes

Does the local network need to be hacked first for IoT devices to be accessible?

13 votes
Accepted

How could one say that older operating systems are more vulnerable?

12 votes

Is pinging a website essentially the same as visiting the website through a browser?

8 votes

authenticity, confidentiality & integrity - general questions

8 votes

How can Linux be secure if it allows for open source contributions from the public?

6 votes

What are the real physical risks of casual social media publishing?

6 votes

How does the Whatsapp web client synchronize with the mobile application keeping all E2E?

6 votes
Accepted

Why is Webauthn not used as primary authentication method?

4 votes

Google Account collecting browser history and cookies?

4 votes
Accepted

How did this site prevent me from creating multiple accounts?

3 votes

Server side Excel file security

3 votes

Should I also hash my session id before storing it in the database?

3 votes
Accepted

Corrupted Address When Performing 64 Bit ROP Chain

3 votes
Accepted

Is message signing important in a client-server chatroom already over TLS?

3 votes

Are there any OSes that verify program signatures before executing them?

3 votes
Accepted

Token-only vs. login-token authentication

3 votes
Accepted

Is there a current best practice for authorizing an SPA to get/post to API

2 votes
Accepted

Confidentiality doesn't provide integrity, but it does enable it?

2 votes
Accepted

Sending data securely from a microcontroller to a server

2 votes

When to use Session key or Premaster Key

2 votes
Accepted

How to properly implement encrypted connection between two parties who trust each other with SSL?

2 votes
Accepted

Why are one time password reset links safer than one time passwords?

2 votes

Chaskey - LightWeight MAC algorithm

2 votes
Accepted

Considerations if I were to lengthen session expiration dates at some interval if the client stays active?

2 votes

What are TLS Cipher Suites with ephemeral key Exchange and NULL encryption for

2 votes
Accepted

CVE-2016-5195 - impacts on virtualization

2 votes

Is public-key encryption the correct choice?

2 votes

Does Open-Source imply Authenticity?

2 votes

How to securely store information without a key or password?