I need help figuring out this cipher from a video game. Its been on going for 8 years and no one has been able to solve it! [closed]

TheGiant
kCmlgFi6GUJNgkNI1Q41fbfyLoCFTCvIqkZiI0KIAXAzP1U1uy1BE4UfPBfpKmmLObjYnQNRBaPtKiVWzc5A4v0w3xle8FOhAGJZ7g4in0wndJxMOvO3dc1M82at2T6935roTqyWDgtGD/hwwRF3oHqFM5Vcw1JtINbsgWRm4o4/quEDkZ7x1B275bX3/Fo1

Continue reading I need help figuring out this cipher from a video game. Its been on going for 8 years and no one has been able to solve it! [closed]

Security concerns when adding virtual keys to an existing system relying on physical DESfire keys

Imagine a room shared by many people that can obtain a key to the room, once they meet a certain set of requirements. The room has an electronically controlled door lock, which can be locked and unlocked digitally by sending appropriate co… Continue reading Security concerns when adding virtual keys to an existing system relying on physical DESfire keys

NIST Releases First Post-Quantum Encryption Algorithms

From the Federal Register:

After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was CRYSTALS-KYBER, along with three digital signature schemes: CRYSTALS-Dilithium, FALCON, and SPHINCS+.

These algorithms are part of three NIST standards that have been finalized:

Continue reading NIST Releases First Post-Quantum Encryption Algorithms

How do I capture HTTPS requests with Python if I have full access to the user’s computer

Before any of you answer, "HTTPS is built on top of TLS and everything is encrypted"
I need to specify a very important note: I have FULL access to the client’s machine (Windows)
My requirement is that I need to capture HTTP(s) r… Continue reading How do I capture HTTPS requests with Python if I have full access to the user’s computer