Skip to main content
The 2024 Developer Survey results are live! See the results
AndrolGenhald's user avatar
AndrolGenhald's user avatar
AndrolGenhald's user avatar
AndrolGenhald
  • Member for 7 years, 1 month
  • Last seen this week
192 votes

4-dial combination padlock: Is it more secure to zero it out or to blindly spin the dials after locking?

184 votes
Accepted

Chrome generated passwords not high entropy?

124 votes
Accepted

How can I be pwned if I'm not registered on the compromised site?

84 votes
Accepted

How can SSH server know private key is incorrect if passphrase havent been provided yet?

82 votes
Accepted

How many rounds of hashing is enough for a password manager?

59 votes
Accepted

Why should we sometimes use --+ instead of -- in SQL injection to comment the rest of the query?

47 votes
Accepted

Why is my computer making requests to my Roku about spotify?

47 votes
Accepted

How is it possible for user's password to be changed after storage was encrypted? (on OS X, Android)

47 votes
Accepted

Why would image resources loaded from different origins triggering HTTP authentication dialogs be harmful?

46 votes

How to secure passwords over HTTP?

43 votes

Recover deleted file despite full disk encryption

22 votes

What would be the key size for a picture used as a key?

17 votes

Why iterate 5200 times when computing Safety Numbers in Signal?

17 votes
Accepted

Why not store password in cookie?

17 votes

How to verify the checksum of a downloaded file (pgp, sha, etc.)?

17 votes
Accepted

Maximum tries for 2FA code?

17 votes
Accepted

Does HSTS protect against a rogue CA issuing a illegitimate valid certificate?

14 votes

How bad would a partial hash leak be, realistically?

14 votes

How likely is a collision using MD5 compared to SHA256 (for checking file integrity)?

13 votes
Accepted

Appending a secret (pepper) to Argon2 password hashes

12 votes

Why can't I share a one use code with anyone else?

11 votes

IP address opening email

11 votes
Accepted

Why using the premaster secret directly would be vulnerable to replay attack?

11 votes

How bad is using date to generate a "random" password?

10 votes

Why is linux filesystem considered DAC and not MAC

10 votes
Accepted

Securing hashes of short enumerated values

9 votes
Accepted

What happens to a pass vault when the GPG key expires?

9 votes
Accepted

Why bother with certain types of 2fa if they can be easily bypassed?

8 votes
Accepted

Why can a man-in-the-middle attack not happen with RSA?

8 votes
Accepted

Does Strict-Transport Security Header (HSTS) need to be applied to non 200 response pages (e.g. 403, 302)

1
2 3 4 5
7