How do Yubikeys improve security if I am typically also forced to enable other, weaker 2FA methods?

It is typically recommended to enable 2FA wherever possible. Moreover, it is typically recommended to enable not just any 2FA method, but Yubikeys in particular.
Yubikeys are considered to be the strongest available 2FA method. They are ni… Continue reading How do Yubikeys improve security if I am typically also forced to enable other, weaker 2FA methods?

How to securely pass secrets if I’m deploying my app n the old school way, rather than using Docker, Heroku, cloud etc?

Is it unsafe to use environmental variables for secret data?
^^ according to that question and answers:

Environment variables are a poor (though perhaps passable, as per Forest’s comment) way to store secrets;
The preferred way is to use … Continue reading How to securely pass secrets if I’m deploying my app n the old school way, rather than using Docker, Heroku, cloud etc?

Is it practically possible to use SVGs to their full potential while still enjoying all protections offered by Content Security Policy (CSP)?

My understanding is that:

SVGs offer far greater functionality if they are directly embedded in a site’s HTML code via the <svg> tag than if they are linked to via the <img> tag

For example, if the <svg> tag is used, it… Continue reading Is it practically possible to use SVGs to their full potential while still enjoying all protections offered by Content Security Policy (CSP)?

To what attacks is using the value of the HOST header to craft self-referential URLs vulnerable?

From official ASP.NET Core docs, namely Routing in ASP.NET Core § URL generation concepts:

Use GetUri* extension methods with caution in an app configuration that doesn’t validate the Host header of incoming requests. If the Host header o… Continue reading To what attacks is using the value of the HOST header to craft self-referential URLs vulnerable?

Realistically, how likely it is to have a computer compromised from browsing random websites?

Another question inspired by a recent discussion in the ‘The DMZ’ chatroom.
Long story short: IT guys are worried that accountants’ workstations may become compromised because accountants watch cat meme websites. Proposed solution: Lock do… Continue reading Realistically, how likely it is to have a computer compromised from browsing random websites?

Realistically, how likely it is to have a computer compromised from browsing random websites?

Another question inspired by a recent discussion in the ‘The DMZ’ chatroom.
Long story short: IT guys are worried that accountants’ workstations may become compromised because accountants watch cat meme websites. Proposed solution: Lock do… Continue reading Realistically, how likely it is to have a computer compromised from browsing random websites?

How does validating the PGP signature of a downloaded executable against the publisher’s public key show that the binary has not been tampered with?

Websites that host downloadable executables often provide measures to confirm the integrity of the data that is available to download. Such measures include:

Hosting the website under HTTPS;
Providing the SHA-256 sum of the downloaded bin… Continue reading How does validating the PGP signature of a downloaded executable against the publisher’s public key show that the binary has not been tampered with?