If a file is digitally signed, is posting a hash very useful for security purposes?

In this question I asked about how to handle situations when SHA-256 hashes are not available for a file downloaded from the internet that contains executable code. Another community member insightfully asked if a hash is really needed to… Continue reading If a file is digitally signed, is posting a hash very useful for security purposes?

If a file is digitally signed, is posting a hash very useful for security purposes?

In this question I asked about how to handle situations when SHA-256 hashes are not available for a file downloaded from the internet that contains executable code. Another community member insightfully asked if a hash is really needed to… Continue reading If a file is digitally signed, is posting a hash very useful for security purposes?

If a file is digitally signed, is posting a hash very useful for security purposes?

In this question I asked about how to handle situations when SHA-256 hashes are not available for a file downloaded from the internet that contains executable code. Another community member insightfully asked if a hash is really needed to… Continue reading If a file is digitally signed, is posting a hash very useful for security purposes?

How to prevent endpoint data from being modified and endpoint client application from being modified

Let’s say an online system uses mostly endpoint storage for storing all kinds of private or sensitive data for each of the client/user, this way the server at the least has some post-data-leakage security.
What I am concerned about are the… Continue reading How to prevent endpoint data from being modified and endpoint client application from being modified

How to avoid data discrepancy between multiple parties with dependent financial interests?

Generalized problem
say there are 2 companies/parties A and B (there may be more) and there is an event E which is recorded by both A and B.
Let’s say the occurrences of event E according to A is ‘E by A’ and according to B is ‘E by B’.
B … Continue reading How to avoid data discrepancy between multiple parties with dependent financial interests?

Verify that data submitted by user was produced by my app

I’m designing an app (for PC), that is intended to run on users’ machines and generate a file with some data. The user will then upload the file to the server, and I want to verify that this file has been produced by my app and hasn’t been… Continue reading Verify that data submitted by user was produced by my app

The v.Nu HTML validator program does not send anything over the network, does it? [closed]

I have finally found a HTML validator running on the command line, locally, which actually works and doesn’t want me to pay them money. It appears to work.
It’s this one, apparently made by W3: https://validator.github.io/validator/
Each t… Continue reading The v.Nu HTML validator program does not send anything over the network, does it? [closed]