Skip to main content
Limit's user avatar
Limit's user avatar
Limit's user avatar
Limit
  • Member for 8 years, 3 months
  • Last seen more than a month ago
4 votes
2 answers
2k views

What are the risks of still using a 1024-bit certificate in a private network?

4 votes
1 answer
1k views

What are the pros and cons of disclosing a vulnerability before it is patched?

3 votes
1 answer
418 views

Does Android have no protection against malicious public USB ports?

3 votes
3 answers
600 views

Does end to end encryption have applications/use cases outside of messaging/email?

3 votes
2 answers
283 views

Are there established and/or curated security benchmarks/best practices for home appliances and networks?

2 votes
2 answers
3k views

What is the risk if I don't have a passphrase associated with CA private key?

2 votes
1 answer
624 views

What security considerations should I keep in mind when setting up home automation using IFTTT?

2 votes
1 answer
505 views

Is there a security risk in using pointers instead of struct instances?

1 vote
1 answer
590 views

Is the FIPS module of openSSL with fixed base address a security risk?

1 vote
3 answers
178 views

How can cloud service providers know that they are being used for launching a DoS?

1 vote
1 answer
2k views

How to validate the integrity of a library at run time?

1 vote
2 answers
348 views

What is the impact of "urgent Firefox update" malware?

1 vote
1 answer
152 views

Is it possible to ensure that only two specific services are allowed to talk to each other?

1 vote
1 answer
137 views

How is this Identity aware encryption description different from simple authorized access?

1 vote
2 answers
173 views

What are the benefits of using different certificates to identify the same service to different audiences?

0 votes
2 answers
304 views

Is encryption an efficient way to protect digital media?

0 votes
2 answers
420 views

Is it possible to have a secure authentication protocol which doesn't involve trusted third party and encryption of data?

0 votes
0 answers
103 views

What are the dangerous use cases of Montreal's bluetooth based vehicle traffic detection logic?

0 votes
1 answer
141 views

Why is establishing trust in public key cryptography a harder problem than its computational costs?

0 votes
1 answer
127 views

Why would a software need my IP address in authentication token?

-1 votes
3 answers
233 views

How to protect your web application's data against an injected JavaScript?