Why does keycloak use HS256 algorithm to sign access token when client settings specify RS256?

I have the following setup with a keycloak authentication server and an application:

user logs in on application client side, send un/pw to server
application server sends un/pw to keycloak server for a token
keycloak server sends a token… Continue reading Why does keycloak use HS256 algorithm to sign access token when client settings specify RS256?

What steganographic techniques can I use in images that survive lossy compression?

Learning a bit about IT security, a segment of the material was the basics of steganography – specifically, hiding information in the lowest significance bits of images, and converting images into sounds. For the first it occurred to me th… Continue reading What steganographic techniques can I use in images that survive lossy compression?