How does a CDN actually prevent DDoS attacks, when an origin server accepts direct connections?

I am trying to understand how a CDN (like Cloudflare e.g) does protect against a DDoS attack.

I would think that the internet traffic is routed through a CDN’s reverse proxy, then filtered. This assumes that the DNS record o… Continue reading How does a CDN actually prevent DDoS attacks, when an origin server accepts direct connections?

Is there any privacy- or security-relevant difference between FIDO2 and SQRL

I just learned about FIDO2 (WebAuthn) and try to make a comparison to the lesser-known novel SQRL authentication scheme.

Both seem to use the same key elements:

a private, user-resident “master key” thus not relying on a 3rd party like … Continue reading Is there any privacy- or security-relevant difference between FIDO2 and SQRL

How to sign a text in a way, so it can not be altered or split in parts unacknowledged

Given, I want to create a document (text-only for the sake of this question) and give it to someone I do not trust. I am not allowed to publish it myself. It’s probably not going to be published (publicly) anyway.

But in ca… Continue reading How to sign a text in a way, so it can not be altered or split in parts unacknowledged

How likely is a collision using MD5 compared to SHA256 (for checking file integrity)?

Many sites these days offer MD5 and SHA256 hashes to check the integrity of downloaded files or archives.

I wonder how much safer is the use of the SHA256 hashes for integrity checks?

Note: Consider the file content as random input (no a… Continue reading How likely is a collision using MD5 compared to SHA256 (for checking file integrity)?

Will the new australian telecoms bill allow to compel companies to build spy functionality into their software? [migrated]

According to https://parlinfo.aph.gov.au/parlInfo/download/legislation/bills/r6195_aspassed/toc_pdf/18204b01.pdf companies could be required to enhance their software to allow for spying. They would enforce this via a “techni… Continue reading Will the new australian telecoms bill allow to compel companies to build spy functionality into their software? [migrated]