Is Error Level Analysis (ELA) in image forensics a reliable indicator for detecting digital modifications?

I’m reading about Error Level Analysis (ELA) in image forensics as means to detect if modifications were made to a photo. ELA is nicely described here: https://fotoforensics.com/tutorial.php?tt=ela. Also below examples are from that site.
Continue reading Is Error Level Analysis (ELA) in image forensics a reliable indicator for detecting digital modifications?

How does the Noise Protocol Framework provide authenticity in overlay networks like Nebula?

In addition to my question: Is a Nebula overlay network essentially a peer-to-peer mesh network with mutual TLS?.
How does the Noise Protocol Framework work exactly? Especially, how does it provide authenticity to overlay networks such as … Continue reading How does the Noise Protocol Framework provide authenticity in overlay networks like Nebula?

Is a Nebula overlay network essentially a peer-to-peer mesh network with mutual TLS? [closed]

I’m looking into Nebula overlay networks as also offered by the founders of it on defined.net.
To my understanding this type of network is some kind of mesh overlay network, which offers a form of peer-to-peer mutual TLS, is that assumptio… Continue reading Is a Nebula overlay network essentially a peer-to-peer mesh network with mutual TLS? [closed]

Is it possible to block entire TLDs on Ubiquity UniFi devices without a custom DNS?

I’m looking into ways to network wide block specific TLDs such as ZIP, XYZ, MOV. However I prefer to not setup a whole custom DNS specifically for this purpose. I so far did not find a solution yet. A command line option instead of through… Continue reading Is it possible to block entire TLDs on Ubiquity UniFi devices without a custom DNS?

Why are CHACHA20 TLS ciphers not compliant with the NIST guidelines and FIPS/HIPAA standards?

I happen to recall that CHACHA20 ciphers are not compliant with both NIST guidelines and FIPS/HIPAA standards. As used to be stated by htbridge.com SSL tests years ago. I just found similar information a similar note here and comments abou… Continue reading Why are CHACHA20 TLS ciphers not compliant with the NIST guidelines and FIPS/HIPAA standards?

Do countries have the ability to geo block another country entirely when at cyberwar? [closed]

In addition to this question: Does geo blocking whole countries objectively increase security?. When countries are at (cyber) war or have full trade embargos against each other. Do they have the technical ability to geo block the traffic f… Continue reading Do countries have the ability to geo block another country entirely when at cyberwar? [closed]

Does geo blocking whole countries objectively increase security? [duplicate]

I often see whole countries being blocked using GEO-IP blocks in network firewalls and even in web application firewalls. Often with great anecdotal success in reducing the amount of registered intrusions and attacks.
However, I’m wonderin… Continue reading Does geo blocking whole countries objectively increase security? [duplicate]

What is the difference between enhanced container isolation projects like runq, Kata Containers, Firecracker and gVisor?

I’m diving into different solutions to use (virtual machine based) isolation for containers. I found these promising projects: runq, Kata Containers, Firecracker and gVisor. I think that runq, Kata Containers and Firecracker are in essence… Continue reading What is the difference between enhanced container isolation projects like runq, Kata Containers, Firecracker and gVisor?

Is it possible to proxy USB and disconnect when a certain sequence is intercepted before it is (fully) passed to the real USB device?

Let’s assume:

I have a piece of software (with a webUI) that has access to a USB device through the host OS.
The software itself can’t be changed.
The software has the ability to perform a firmware flash on the USB device, also remotely w… Continue reading Is it possible to proxy USB and disconnect when a certain sequence is intercepted before it is (fully) passed to the real USB device?

Are these bash lines (handling untrusted user input) vulnerable to command injection?

If $1 contains untrusted user input for example $(whoami). Are any of the following bash examples vulnerable to command injection?
I’m having issues clearly understanding this behavior in Bash. Also, I have issues with echo -n "$1&quo… Continue reading Are these bash lines (handling untrusted user input) vulnerable to command injection?