Does revealing semantic similarity scores between AES-encrypted data create an exploitable side channel?

Background: My expertise is in machine learning/AI, not cryptography, so I apologize if I’m missing fundamental security concepts. I’m trying to build a privacy-preserving AI agent system and want to understand potential vulnerabilities.
U… Continue reading Does revealing semantic similarity scores between AES-encrypted data create an exploitable side channel?

Secure session management for browser-based screen sharing support tool

I’m designing a web-based screen sharing tool for customer support, where support agents need to view customers’ screens without requiring any software installation.
The flow I’m considering is:

Support agent generates/receives a session … Continue reading Secure session management for browser-based screen sharing support tool

Is creating an internal API within a VPN a recommended practice for securing database access for customer-facing applications?

The InfoSec team of the client I work with has mandated that any customer-facing application’s backend should not directly access the database for that application. They require we create another internal API that is not public and call th… Continue reading Is creating an internal API within a VPN a recommended practice for securing database access for customer-facing applications?