Need help cracking Apple DMG password with 256 bit AES encryption. likely know many characters of the password. Will Pay $$

I’ve been locked out of my personal files for years. They are in a DMG that are protected by a 256 bit encryption. I’ve run the password hash with a custom word list of what I think are partial words, phrases, and numbers I used are with J… Continue reading Need help cracking Apple DMG password with 256 bit AES encryption. likely know many characters of the password. Will Pay $$

Need to prove my ex ipaddress was th 1 logged into her email account when she sent me emails. Its for my court defense. She saying was me sent 2myself

I’m in court with evidence my ex is saying the messages in my evidence are from her email address but wasn’t her but me sending myself 6 days of conversations. Daying I had access. I didnt. I need to prove it was from her house. Basically … Continue reading Need to prove my ex ipaddress was th 1 logged into her email account when she sent me emails. Its for my court defense. She saying was me sent 2myself

Posted in ip

Are there any practical weaknesses in RSA where the private key is used to encrypt a message (signing), without padding? [migrated]

I came across this scenario recently and would like to understand if there are any practical attacks against this implementation.
An RSA private key is used to "encrypt" data. The public key is included in a software component di… Continue reading Are there any practical weaknesses in RSA where the private key is used to encrypt a message (signing), without padding? [migrated]

Posted in RSA