Is it a good idea to reuse certificate issued by public CA for internal database client authentication?

Let’s say we have:

Publicly available HTTPS API (e.g. api.example.com). The web server that runs it uses a certificate from a publicly trusted CA (e.g. Let’s Encrypt) with both server auth and client auth usages.
A database using mutual T… Continue reading Is it a good idea to reuse certificate issued by public CA for internal database client authentication?

The server acts as a database server , but there is no open port regarding that why?

I’ve taken a pen-testing course and for the final certificate, I have to analyze a server and make a report regarding the vulnerabilities.
The server does multiple functionalities, It acts as a web application server ( as I can connect t… Continue reading The server acts as a database server , but there is no open port regarding that why?

How is anonymous voting possible without having to trust the government other than my solution? [closed]

There doesn’t exist a trustless voting system that retains anonymity – yet.
My idea is a name, which:

houses a tamper-proof DNS service, that
may require peer-to-peer grid-telecommunications, which is not my specialization.

This service … Continue reading How is anonymous voting possible without having to trust the government other than my solution? [closed]

What are best practices for finding an account in a SQL database during authentication? Is using `LIMIT 1` vulnerable to timing attacks?

I have a application where users can log in by providing a username or email address (both case insensitive) and a password. In the users table in the database, the relevant account information is stored in three columns lowercase_usernam… Continue reading What are best practices for finding an account in a SQL database during authentication? Is using `LIMIT 1` vulnerable to timing attacks?