Skip to main content
Tour
About Us
Meta
current community
Stack Exchange
chat
Meta Stack Exchange
your communities
Sign up
or
log in
to customize your list.
more stack exchange communities
company blog
Log in
Stack Exchange
All Sites
Top 400 Users
Digests
Bruno Rohée
Paris, France
dev, networking and security
top
accounts
reputation
activity
subscriptions
Top Questions
58
votes
Online backup : how could encryption and de-duplication be compatible?
cryptography
encryption
privacy
backup
asked Sep 14, 2011 at 11:45
security.stackexchange.com
Top Answers
74
Is there ever a good reason _not_ to use TLS/SSL?
security.stackexchange.com
71
How to check if a file is gzip compressed?
stackoverflow.com
39
Should I use alias or alias_method?
stackoverflow.com
36
Why doesn't a TLS certificate with a domain name mask that doesn't match the site name trigger a warning in the browser?
security.stackexchange.com
34
Uniform distribution of truncated md5?
stackoverflow.com
29
How is OpenSSL related to OpenSSH?
security.stackexchange.com
27
Should I worry about compromised firmware when reinstalling an OS?
security.stackexchange.com
23
What does "_" means here?
stackoverflow.com
23
Is Math.random() cryptographically secure?
stackoverflow.com
22
What is the benefit of having FIPS hardware-level encryption on a drive when you can use Veracrypt instead?
security.stackexchange.com
18
Sending non-ASCII text in HTTP POST header
stackoverflow.com
18
OpenBSD vs. NetBSD security
security.stackexchange.com
15
How secure is aSSL (javascript)? Does it effectively mimic SSL?
security.stackexchange.com
14
Is Schneier's "Applied Cryptography" current?
security.stackexchange.com
14
Why is the code CVE-2010-5298 used for a vulnerability discovered in 2014?
security.stackexchange.com
13
The MD5 from a local file and the MD5 (eTag) from S3 is not the same
stackoverflow.com
13
What is the "openssh-blacklist" package? Is it related to the Debian OpenSSL bug?
security.stackexchange.com
13
Why is there a "des-ede3-cbc" in my rsa private key?
security.stackexchange.com
12
How can the NSA remotely turn on your iPhone?
security.stackexchange.com
11
Does buildout/easy_install/setup_tools verify SSL certificates?
stackoverflow.com
11
Advantages and disadvantages of Stream versus Block Ciphers
security.stackexchange.com
10
How do I remove/disable the CBC cipher suites in Apache server?
serverfault.com
9
How to generate Rijndael KEY and IV using a passphrase?
stackoverflow.com
9
How to minify HTML?
stackoverflow.com
9
If you could have only one book on web security, what would it be?
security.stackexchange.com
9
Spam fighting idea
security.stackexchange.com
8
Getting rid of a large quantity of paper
security.stackexchange.com
8
Question of importance of FIPS in security implementations
security.stackexchange.com
8
Why is "something you know" the weakest factor of authentication?
security.stackexchange.com
6
What are the chances to generate the same ssh key?
security.stackexchange.com
1
2
next