I have a client application that communicates with a server through a web API.
The data being communicated is not personally sensitive (no passwords, credit card details, usernames, etc). It’s just challenge/respons… Continue reading Benefit of asymmetric encryption vs trivial alternatives in compromised software?
Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection
I need to decrypt a password. I have the ciphertext for this
however, I have many plain text and encrypted equivalents.
This device can only be given passwords with a maximum of 8 characters from the 0123456789abcdef alphabet, and it can b… Continue reading About pasword encryption algorithm [duplicate]
I was wondering something about a day ago when I remembered that Apple stores notes in a database (so you can recover them or view them on icloud.com) – What if Apple stores your notes in plaintext?
I’ve heard you shouldn’t store passwords… Continue reading Is it bad practice to store passwords in iCloud notes?
The owner of Facebook and Instagram is delaying plans to encrypt users’ messages until 2023 amid warnings from child safety campaigners that its proposals would shield abusers from detection. From a report: Mark Zuckerberg’s social media empire has bee… Continue reading Meta Delays Encrypted Messages on Facebook and Instagram To 2023
How do applications(UnlockGo) that allow one to connect their Android to PC work in removing password?
I thought the password also is used to encrypt Android device. Is the data erased? i.e. Encrypting and using password still useful even … Continue reading Utilities and apps that bypass Google password/security
I have a dual boot PC, where the Win10 (uncompressed) partition is encrypted with BitLocker. I was curious about making this test (and also encryption took quite a short time in my opinion), so while running Linux I did this:
# cat /dev/nv… Continue reading Is looking for plain text strings on an encrypted disk a good test?
I am trying to implement a cramer-shoup cryptosystem but I don’t understand how to work with the plaintext I want to encrypt.
From what I understand, the plaintext needs to be converted to an element of the cyclic group G, which was genera… Continue reading How to convert plaintext to element of cyclic group in Cramer-Shoup cryptosystem [migrated]
Cryptographers are upset that “crypto” sometimes now refers to cryptocurrency, reports the Guardian:
This lexical shift has weighed heavily on cryptographers, who, over the past few years, have repeated the rallying cry “Crypto means cryptography” on … Continue reading Cryptographers Aren’t Happy With How You’re Using the Word ‘Crypto’
I am coding an online password manager as part of my apprenticeship.
I have already coded the full backend to synchronize the encrypted data and a frontend that encrypts and decrypts data with AES. So far, no secrets are shared with the ba… Continue reading How to be sure there are only encrypted data on my backend