Confidentiality of data coming from a country with data protection laws stored in a country with different laws [closed]

I send very confidential items by email, such as photos, addresses, social security numbers, bank numbers, driving card numbers, and diplomas.
Everything was supposed to stay in France.
In fact, it’s an Amazon server in the USA, so no conf… Continue reading Confidentiality of data coming from a country with data protection laws stored in a country with different laws [closed]

Public client or Confidential client: should I generate a client secret?

I’ve read about this but I don’t fully understand how to choose.
I have two options:
Public client

"A native, browser or mobile-device app. Cognito API requests are made from user systems that are not trusted with a client secret.&qu… Continue reading Public client or Confidential client: should I generate a client secret?

Reasons for both First Encrypt then Sign and First sign then Encrypt on which is better specific reasons? [closed]

When we want to send a message from A to B with confidentiality and non repudiation. I want answer and reasons for both the technique
1)
Why First Encrypt then sign is better ?
2)
Why First sign then Encrypt I’d better than 1)

Continue reading Reasons for both First Encrypt then Sign and First sign then Encrypt on which is better specific reasons? [closed]

Why don’t basically all "clusters" and similar distributed systems use Shamir’s secret sharing method? [migrated]

When I came to the topic of Ansible (Vault), when deploying secrets in Ansible and other passwords up to 128 characters Shamir’s Secret Sharing would be an ideal solution I think:

The secret is never in one spot
The secret can be encrypte… Continue reading Why don’t basically all "clusters" and similar distributed systems use Shamir’s secret sharing method? [migrated]

Is it possible to reverse engineer an encryption algorithm derived from AES-128 given these conditions?

Given the following conditions:

The encryption program, which uses some algorithm resembling AES-128 but with unknown modifications to real AES-128.
It uses a fixed key and IV.
It is written in Rust WITH debugging symbols but no source co… Continue reading Is it possible to reverse engineer an encryption algorithm derived from AES-128 given these conditions?