Are there better methods of sustaining forensic integrity apart from disk hashing?

As far as I’ve heard, hashing a disk image before computer forensics is started, and then comparing that hash to a new hash after the forensics is finished is the most common way to make sure that there is no tampering with the disk during… Continue reading Are there better methods of sustaining forensic integrity apart from disk hashing?

Is it safe to derive the salt from the users email/phone number when pre-hashing a password to be sent to a server?

I’m working on making an end-to-end encrypted app that will store sensitive mental health information. The goal is to make it completely impossible for someone with access to the server to see the users raw data. The server acts only as a … Continue reading Is it safe to derive the salt from the users email/phone number when pre-hashing a password to be sent to a server?