Central storage of passport biometric data? [on hold]
Is biometric data (photo, fingerprints etc). on new EU passports stored somewhere centrally?
Continue reading Central storage of passport biometric data? [on hold]
Collaborate Disseminate
Is biometric data (photo, fingerprints etc). on new EU passports stored somewhere centrally?
Continue reading Central storage of passport biometric data? [on hold]
This is not the same question as Why is the same origin policy so important?.
That one asks only about why cookies are only ever send to origin they came from, which I understand.
What I don’t understand is why there’s a re… Continue reading Why is the same origin policy sensible – for requests?
I noticed that the Sign method takes a pseudo-random number generator to sign a message. Why is such a generator needed? After all, verifier has no idea about any pseudo-random number?
It is a RSA-PSS scheme.
Continue reading Why does RSA-PSS require a pseudo-random-generator? [on hold]
In my company, we have a firewall as an edge device to the internet. Behind this central firewall we have management network. We now have to put a router in front of central firewall, as part of some services from ISP.
This router’s interf… Continue reading Management network access from internet-accessible router
Which vendors of network products like firewalls, routers, switches, VPN softwares and similar are likely to be free from backdoors, already built in surveillance capabilities, secretly broken encryption keys inserted by NSA?… Continue reading Network product (software and hardware) vendors independent from NSA in 2018
I am trying to use webrtc in chrome extension. I am trying with this code to give permissions of mic.
navigator.getUserMedia = navigator.getUserMedia || navigator.webkitGetUserMedia || navigator.mozGetUserMedia || navigator…. Continue reading chrome Extension navigator.getUserMedia not asking for the mic permission [on hold]
I have 3 questions about a VPN and especially a VPN Router:
1) I know exactly what a VPN is and what wifi encryption (wpa/wpa2 etc.) is, but what I can’t seem to understand is if a VPN Router will add more encryption on the … Continue reading Does a VPN Router also encrypts the data being sent from a mobile device
It is my current understanding that in order to successfully exploit a stack-based buffer overflow vulnerability, we must first overflow the buffer, thus overwriting the return pointer and gaining control of EIP. Once we control EIP, we ca… Continue reading Buffer overflows on the heap vs the stack
I received message in my inbox of facebook which says my friend sent me a gif.
Now, is it safe if I only see the message? By seeing the message I mean “just” the message itself, and not click on the “gif”. is it safe?
Or it i… Continue reading Is it safe to open a message in inbox? (but not the GIF itself?)
I want to generate wordlist with these rules: 8 characters, at least one uppercase letter, at least one lowercase letter, exactly two numbers. I’ve done a lot of google searching, and can’t seem to understand how to do this. Can I get some… Continue reading Generate a wordlist using John the Ripper