How Google location changes to a different location
Does anyone have an idea how it is possible that my phone registers a location I have never been to before?
Continue reading How Google location changes to a different location
Collaborate Disseminate
Does anyone have an idea how it is possible that my phone registers a location I have never been to before?
Continue reading How Google location changes to a different location
When an SSL certificate is expiring, does generating a new key and new CSR with the same name as the host, replace the existing one or cause any issue?
Because I used the same name, and looks like the SSL sign is not working… Continue reading SSL certificate renewal process
Let’s say I have an application (A) installed on my PC that communicates with some server over https. What would another application (B) on my machine need to do to be able to read the unencrypted data?
The only way I can th… Continue reading See data sent by application over https
I’m running Firefox 65.0.1 and Chrome 72.0.3626.121 on MacOS 10.13.6.
In a terminal window, ran this command to set the SSLKEYLOGFILE environment variable:
$ export SSLKEYLOGFILE=/Users/username/logdir/sslkey1.log
Then … Continue reading Why doesn’t Firefox write to SSLKEYLOGFILE when Chrome does? [on hold]
I have a web service that I set up which allows users to protect their accounts via two factor authentication via an authenticator app like Google Authenticator and Authy.
When enabling it, I mention to write down the authen… Continue reading What to do if a user loses access to his authenticator code?
I read this article saying that smartcards used as a 2FA are still susceptible to attacks such as MITM attack:
They think 2FA is unhackable…undefeatable, when that clearly isn’t true. They think 2FA will stop advanced p… Continue reading Can a hacker compromise the system if he can steal one of the factors of the 2FA?
In the Diffie-Hellman protocol, if the participants have their own private key and a generated public key. How can we determine whether or not they have a trusted CA for authentication or just the original protocol wherein pa… Continue reading Diffie-Hellman protocol CA, confusing
hi Everyone please correct me if im wrong for my understanding for the man in the middle attack used in a variant of diffie hellman key exchange .
am i right to say that a protocol is susceptible to the man in the middle att… Continue reading understanding MITM attack
I have a command line to sign an executable using Microsoft’s signtool, and one way to identify my certificate is with a sha1 thumbprint. The command looks like:
signtool sign […] /sha1 <sha1_thumbprint> […] file.exe
My questi… Continue reading Is a certificate’s thumbprint considered private?
I’m quite new to information security topics and am looking for guidance to implement secure transmission of statistical data from an app to a server. In addition, I don’t want any knowledge about the data stored on the serve… Continue reading Share a public key from an app to verify authenticity of data submitted