DTLS vs direct use of AES. What are the threats unique for direct use of AES instead of DTLS?

For regular traffic in mesh network (between Internet of Thing devices) customer decided to use one of two options:

DTLS PSK ciphersuite – DTLS based on pre-shared symmetric key
or direct use of AES – customer wants to minimize traffic be… Continue reading DTLS vs direct use of AES. What are the threats unique for direct use of AES instead of DTLS?

Does MEGA store my password or decryption key? How do they check the login information I entered is correct or not?

Does MEGA store my password or decryption key? How do they check if the login information I enter is correct while only my email address is sent to the server?

I read this article: How can mega store my login details and still be secure?
Continue reading Does MEGA store my password or decryption key? How do they check the login information I entered is correct or not?

AES encryption (in Java) of different JSON strings always produce same encrypted string as result. Why? [closed]

I have a program written in Java which takes JSON string as argument, encrypts it using AES then encodes it using Base64.
JSON string is like:

{“a”: “b”} or {“a”: “n”} or {“a”: “k”}

I.e related object would have one property a. Value… Continue reading AES encryption (in Java) of different JSON strings always produce same encrypted string as result. Why? [closed]

Securing Internet Videoconferencing Apps: Zoom and Others

The NSA just published a survey of video conferencing apps. So did Mozilla. Zoom is on the good list, with some caveats. The company has done a lot of work addressing previous security concerns. It still has a bit to go on end-to-end encryption. Matthew Green looked at this. Zoom does offer end-to-end encryption if 1) everyone is using a… Continue reading Securing Internet Videoconferencing Apps: Zoom and Others