Public Key Crypto – sign Bob’s name into Alice’s message or encrypt Alice’s name

I was reading Defective Sign & Encrypt in S/MIME, 
PKCS#7, MOSS, PEM, PGP, and XML

and in section 5.1  Naming Repairs

By signing Bob’s name into her message, Alice explicitly identifies
him as her intended recipie… Continue reading Public Key Crypto – sign Bob’s name into Alice’s message or encrypt Alice’s name

public WiFi hotspot-What is leaking at that tiny moment before connecting to a VPN?

When you sign up for a VPN account you also download the service’s client,be it for Android, Windows etc but this question is specifically for Android or portable devices connecting through public hostspots.

For the VPN clie… Continue reading public WiFi hotspot-What is leaking at that tiny moment before connecting to a VPN?

HOW is the malicious URL/payload is delivered to the user on a DOM based XSS attack?

Testing for DOM based XSS at OWASP reads:

The first hypothetical example uses the following client side code:

<script>
document.write(“Site is at: ” + document.location.href + “.”);
</script>

An attacke… Continue reading HOW is the malicious URL/payload is delivered to the user on a DOM based XSS attack?