Anyone know how to decipher this? [closed]
Can anyone help me decipher this?
rw8fA8cxckw6y1shjIzu19wrc6LuLw7bx1525s3rTBTxB828669wɥ7wiidAJ8ox
Collaborate Disseminate
Can anyone help me decipher this?
rw8fA8cxckw6y1shjIzu19wrc6LuLw7bx1525s3rTBTxB828669wɥ7wiidAJ8ox
I am working on a project where I need to securely encrypt and decrypt files on a product without the ability for direct communication or key derivation after the product is sold. The challenge is that I can only store encrypted data on th… Continue reading Encryption without a classic exchange scenario
I am attempting to perform real time decryption of TLS 1.3 packets (TLS_AES_256_GCM_SHA384). I have retrieved the mastersecrets for the specific flow by using uprobes on OpenSSL, and matched the mastersecrets to the flow using ClientRandom… Continue reading Real Time Decryption of TLS 1.3 packets Asked today Modified today [closed]
I am in the process of creating a Python pipeline intended for reading and processing sensitive medical personal data from password-protected Excel files. The pipeline utilizes the msoffcrypto library, specifically the OfficeFile.load_key … Continue reading Assessing the Implications of Using msoffcrypto for Open Sourcing a Medical Data Processing Pipeline
can I retrieve metadata from a text that was sent to me? what about email? what about a closed website? if anyone can help, either extract it or read it, that would be great. The closed website belongs to me.
I am on the very last functionality to implement before launching my app. I have the same requirements someone like Fanduel or Draftkings does. When my users cross the $600 threshold for prizes in the year, I need to store their ss number … Continue reading Help me securely store and retrieve Social Security numbers [closed]
I have a few questions about CrypTool.
How can you use the text analysis tools available in CrypTool to determine the encryption algorithm for a given ciphertext?
How can you use CrypTool’s text analysis tools to determine the password u… Continue reading CrypTool – How to determine what type of encryption has been used?
I am doing a research on detecting Stealthy False Data Injection (SFDI) attacks in a smart grid context (a related paper). Besides I am working on a chaotic cryptography (e.g. with Lorenz attraction) for encryption and decryption of the tr… Continue reading Is it possible to detect Stealthy False Data Injection attack through chaotic cryptography? [migrated]
In this scenario, the attacker is not trying to discover secret information or break the system. Instead, his objective is to create an exact replica of the card and sell it at a lower price.
This means that he does not have to know anythi… Continue reading How can a stolen computer card be protected from being re-manufactured and resold?
it need help on how to decrypt this stuff or where i can, idk what its encrypted in nor got the key