How can a timing/cache side-channel attack be performed? How can attack know the time of which certain instructions are performed by the victim?

About timing my question is:
How can attack know the time of which certain instructions are performed by the victim?
And about the cache, how can attacker know which cache line is being accessed by the victim? Is this doable in "norma… Continue reading How can a timing/cache side-channel attack be performed? How can attack know the time of which certain instructions are performed by the victim?

Does the Time-To-Live (TTL) value of DNS records have any security implications?

I’m currently reading about resource record in the Domain Name System (DNS), in particular about the Time to live (TTL) aspect of start of authority records (SOA) records. It seems to me that the TTL was firstly defined in RFC 1034 and la… Continue reading Does the Time-To-Live (TTL) value of DNS records have any security implications?

Does Safari’s "Prevent cross-site tracking" option ACTUALLY prevent determined efforts at cross-site tracking? (By, e.g. Facebook)

In other words: Does Safari’s "Prevent cross-site tracking" option effectively prevent cross-site tracking? (Is it for purpose?) I though it would work; are my expectations off?
Or, more specifically, I’m wondering: Why is Facebo… Continue reading Does Safari’s "Prevent cross-site tracking" option ACTUALLY prevent determined efforts at cross-site tracking? (By, e.g. Facebook)

Is it bad practice or major security risk to cache decoded auth tokens in my backend?

I’ve set up a firebase passport strategy on a NestJS server which works fine, but I did not like the long load times it would incur on all requests that went through it. So I decided to cache decoded tokens until they are expired, and this… Continue reading Is it bad practice or major security risk to cache decoded auth tokens in my backend?

How can I protect browser cached files to be accessed in a case of a stolen hard drive?

For the usual reasons we want to cache certain resources browser side, e.g. list of products bought in the past.
Context is a web application, accessed via the internet.
This list is confidential in my case, and I want to mitigate the case… Continue reading How can I protect browser cached files to be accessed in a case of a stolen hard drive?