Authorization Code Grant Flow for web-app with backend on separate domain (same origin)

We have had a security consultant make a recommendantion of an approach that does not follow the IEFF best-practice document (https://tools.ietf.org/html/draft-ietf-oauth-browser-based-apps-04#section-6). I am looking for reasons why this … Continue reading Authorization Code Grant Flow for web-app with backend on separate domain (same origin)

When connecting to someones wifi without using it, can they see search history from the past?

We visited a friend who’s working as a programmer. He told me to connect my phone to his wifi so he could send me a picture, however he didn’t send it and I left my phone connected to his wifi for an hour without using it.

Can he see my … Continue reading When connecting to someones wifi without using it, can they see search history from the past?

How to prevent my web searches showing up as ads on family members device with same wifi connection?

Today I was shopping for a New Years journal on my desktop and apparently other family members’ devices started showing up ads for the same. I feel this could be because we are all on the same wifi. We do not share any email … Continue reading How to prevent my web searches showing up as ads on family members device with same wifi connection?

Could you anonymously upload a file on the internet if the threat model was the entire world trying to find your identity after you do so? [on hold]

Thought experiment: You need to upload a file, and the threat model is the entire world trying to find out who you are after you do so.

I know this is absurd, but bear with me, it’s a thought experiment, where the scenario i… Continue reading Could you anonymously upload a file on the internet if the threat model was the entire world trying to find your identity after you do so? [on hold]