Is it viable to defend against brute force attacks by rejecting correct passwords?

(found on reddit)
[translation: the website is programmed to reject the login if it is the correct password and if it is the first login attempt]
Assume that the scheme is to reject the first correct login attempt – because otherwise it d… Continue reading Is it viable to defend against brute force attacks by rejecting correct passwords?

Why do apps such as the DuckDuckGo browser or Signal seem to try to protect my own data from me?

This is a general pattern that occurs in various security- and privacy-conscious applications…
The DuckDuckGo browser, for example, won’t let me show my browsing history. It does seem to store it, however, since it shows visited links in… Continue reading Why do apps such as the DuckDuckGo browser or Signal seem to try to protect my own data from me?

How do Yubikeys improve security if I am typically also forced to enable other, weaker 2FA methods?

It is typically recommended to enable 2FA wherever possible. Moreover, it is typically recommended to enable not just any 2FA method, but Yubikeys in particular.
Yubikeys are considered to be the strongest available 2FA method. They are ni… Continue reading How do Yubikeys improve security if I am typically also forced to enable other, weaker 2FA methods?

How to securely pass secrets if I’m deploying my app n the old school way, rather than using Docker, Heroku, cloud etc?

Is it unsafe to use environmental variables for secret data?
^^ according to that question and answers:

Environment variables are a poor (though perhaps passable, as per Forest’s comment) way to store secrets;
The preferred way is to use … Continue reading How to securely pass secrets if I’m deploying my app n the old school way, rather than using Docker, Heroku, cloud etc?

Is it practically possible to use SVGs to their full potential while still enjoying all protections offered by Content Security Policy (CSP)?

My understanding is that:

SVGs offer far greater functionality if they are directly embedded in a site’s HTML code via the <svg> tag than if they are linked to via the <img> tag

For example, if the <svg> tag is used, it… Continue reading Is it practically possible to use SVGs to their full potential while still enjoying all protections offered by Content Security Policy (CSP)?