What’s the most simple approach to this wordlist generation and ruleset problem?

This is a password recovery project, which is more complex than just generated a wordlist, since using my tries (see below) it seems to be not enough to just generate a wordlist.
I’m trying to recover my old Bitcoin wallet, which I created… Continue reading What’s the most simple approach to this wordlist generation and ruleset problem?

Why don’t basically all "clusters" and similar distributed systems use Shamir’s secret sharing method? [migrated]

When I came to the topic of Ansible (Vault), when deploying secrets in Ansible and other passwords up to 128 characters Shamir’s Secret Sharing would be an ideal solution I think:

The secret is never in one spot
The secret can be encrypte… Continue reading Why don’t basically all "clusters" and similar distributed systems use Shamir’s secret sharing method? [migrated]

Is it possible to reverse engineer an encryption algorithm derived from AES-128 given these conditions?

Given the following conditions:

The encryption program, which uses some algorithm resembling AES-128 but with unknown modifications to real AES-128.
It uses a fixed key and IV.
It is written in Rust WITH debugging symbols but no source co… Continue reading Is it possible to reverse engineer an encryption algorithm derived from AES-128 given these conditions?

Is UAC an overestimated protection measure in Windows? Does Linux do it better?

Windows is an API-based operating system, whereas Linux is file-based. Hence in my opinion, any operating system API security measures alone aren’t effective in Windows. One of such examples would be UAC in my humble opinion.
On the other … Continue reading Is UAC an overestimated protection measure in Windows? Does Linux do it better?

As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?

From a forensics standpoint, is there any technical possibility that WITHOUT rooting the device the potential cybercriminal used a manipulated system phone app to have hidden functionalities like secret messaging, which he had modified via… Continue reading As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?