Skip to main content
Tour
About Us
Meta
current community
Stack Exchange
chat
Meta Stack Exchange
your communities
Sign up
or
log in
to customize your list.
more stack exchange communities
company blog
Log in
Stack Exchange
All Sites
Top 400 Users
Digests
AndrolGenhald
Cedar Rapids, IA, USA
top
accounts
reputation
activity
subscriptions
Top Questions
No questions with score of 5 or more
Top Answers
193
4-dial combination padlock: Is it more secure to zero it out or to blindly spin the dials after locking?
security.stackexchange.com
184
Chrome generated passwords not high entropy?
security.stackexchange.com
126
How can I be pwned if I'm not registered on the compromised site?
security.stackexchange.com
84
How can SSH server know private key is incorrect if passphrase havent been provided yet?
security.stackexchange.com
82
How many rounds of hashing is enough for a password manager?
security.stackexchange.com
59
Why should we sometimes use --+ instead of -- in SQL injection to comment the rest of the query?
security.stackexchange.com
49
Why is my computer making requests to my Roku about spotify?
security.stackexchange.com
48
Why would image resources loaded from different origins triggering HTTP authentication dialogs be harmful?
security.stackexchange.com
48
How is it possible for user's password to be changed after storage was encrypted? (on OS X, Android)
security.stackexchange.com
46
How to secure passwords over HTTP?
security.stackexchange.com
45
Recover deleted file despite full disk encryption
security.stackexchange.com
23
What would be the key size for a picture used as a key?
security.stackexchange.com
18
Does HSTS protect against a rogue CA issuing a illegitimate valid certificate?
security.stackexchange.com
17
Maximum tries for 2FA code?
security.stackexchange.com
17
How to verify the checksum of a downloaded file (pgp, sha, etc.)?
security.stackexchange.com
17
Why not store password in cookie?
security.stackexchange.com
17
Why iterate 5200 times when computing Safety Numbers in Signal?
security.stackexchange.com
15
How bad would a partial hash leak be, realistically?
security.stackexchange.com
14
How likely is a collision using MD5 compared to SHA256 (for checking file integrity)?
security.stackexchange.com
13
Appending a secret (pepper) to Argon2 password hashes
security.stackexchange.com
12
Why can't I share a one use code with anyone else?
security.stackexchange.com
11
Why using the premaster secret directly would be vulnerable to replay attack?
security.stackexchange.com
11
IP address opening email
security.stackexchange.com
11
How bad is using date to generate a "random" password?
security.stackexchange.com
10
Securing hashes of short enumerated values
security.stackexchange.com
10
Why is linux filesystem considered DAC and not MAC
security.stackexchange.com
9
Why bother with certain types of 2fa if they can be easily bypassed?
security.stackexchange.com
9
What happens to a pass vault when the GPG key expires?
security.stackexchange.com
8
Why isn't HTTPS enough to defeat an evil twin attack?
security.stackexchange.com
8
How do FIDO keys prevent MITM reflection attacks?
security.stackexchange.com
1
2
3
next