How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website.
The System
For the sake of explanation, assume the website is hosted at domain test.com.
Think of this system as a &qu… Continue reading How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card

Any "smart" way to disable telemetry of a web application on OS/hardware level? Any specific guide/tool recommend if we use linux and lnmp env

Let’s say we know as a fact that a php web application baked in telemetry to collection data. Without scanning through the codebase, any quick hack tool that we can force the telemetry become useless given that we have full access the har… Continue reading Any "smart" way to disable telemetry of a web application on OS/hardware level? Any specific guide/tool recommend if we use linux and lnmp env

What is the difference between the terms "data collection" and "data exfiltration" in adversary tactics? [closed]

I’m a Cybersecurity enthusiast who recently started learning the ATT&CK Framework tactics
I came across two different terms, Collection and Exfiltration, which I think generally refers to the act of data breaching.
Unfortunately, I can… Continue reading What is the difference between the terms "data collection" and "data exfiltration" in adversary tactics? [closed]

If I hibernate my Linux distro (which has an encrypted partition) and store it in a unencrypted swap partition, can an attacker access all my data?

Is it possible? How? Should I encrypt my swap partition? If I don’t encrypt it, basically I make encryption in the main partition useless.

Continue reading If I hibernate my Linux distro (which has an encrypted partition) and store it in a unencrypted swap partition, can an attacker access all my data?