What is the best way to protect public keys sitting on server against MITM attack with this zero-trust & end-to-end secure structure? [closed]

This one is a handful to describe. I’ve got on offline first stricture, server is only used for client database sync. This is a zero-trust structure. I don’t care how secure my BaaS provider is, how secure my server is or who my threat act… Continue reading What is the best way to protect public keys sitting on server against MITM attack with this zero-trust & end-to-end secure structure? [closed]

What is the best way to calculate true password entropy for human created passwords?

Okay, I know it might seem this has already been beaten to death but, hear me out. I am including a fairly good password strength algorithm for my app for users on sign-up. This one, which I’ve copied (with minor adjustments). I also want … Continue reading What is the best way to calculate true password entropy for human created passwords?

Necessity & possibility of client-server VPN for an extra layer of security for mobil applications?

I imagine that to some professionals on here this question may be redundant. This is being asked from the viewpoint of a relative beginner dev.
I would like to add an extra layer of security between client & server. I’m wondering if it… Continue reading Necessity & possibility of client-server VPN for an extra layer of security for mobil applications?

How vulnerable is security if a public key is swapped by active attacker if a key check is done?

Trying to understand this from a high level conceptually. It is obvious from all information on Asymmetric encryption that a public key can be of course, public and there isn’t a danger of interception. So I’m faced with a point in my soft… Continue reading How vulnerable is security if a public key is swapped by active attacker if a key check is done?

Would this way of going about protecting users’ data in use be secure, or overkill?

I’ve got information security as high as possible with my Flutter app so far with encryption and proper storage for data at rest as well as data in transit. With this question I’m only aiming for protecting data at rest.
If I did something… Continue reading Would this way of going about protecting users’ data in use be secure, or overkill?