Concatenating timestamp to data before encrypting it – is this a commonly used technique?

I have a web app that communicates with a backend server, and the users of the web app are organisations that each have a single login for the entire organisation. The app is meant to be used for example on TV’s in the cafeteria to display… Continue reading Concatenating timestamp to data before encrypting it – is this a commonly used technique?

Can I use OpenSSL to generate a key from asn1 configuration file without specifying the modular multiplicative inverse q^-1 (mod p)

I’m trying to create this gimmicky public-private RSA key pair where p and q are the same number. I would want to use the asn1 parser in OpenSSL, but I’m required to specify the coeff parameter, the multiplicative inverse for… Continue reading Can I use OpenSSL to generate a key from asn1 configuration file without specifying the modular multiplicative inverse q^-1 (mod p)

Is there greater risk to browsing websites with invalid certificates than websites with no certificate at all?

The information security community is generally very adamant that users should not proceed to visit websites that have invalid SSL certificates. Web browsers have gotten less and less cooperative with users who want to ignore… Continue reading Is there greater risk to browsing websites with invalid certificates than websites with no certificate at all?

I have a conceptual idea for a network that could obfuscate the geolocation of a mobile station. I would appreciate short, critical feedback

I am a student in network engineering, and I have a technical essay due on November 18th. I can choose the topic of the essay myself. I have a conceptual idea of a network that could help obfuscate the geolocation of a mobile device. If yo… Continue reading I have a conceptual idea for a network that could obfuscate the geolocation of a mobile station. I would appreciate short, critical feedback