Hackaday Links: March 10, 2024
We all know that we’re living in a surveillance state that would make Orwell himself shake his head, but it looks like at least one company in this space has …read more Continue reading Hackaday Links: March 10, 2024
Collaborate Disseminate
We all know that we’re living in a surveillance state that would make Orwell himself shake his head, but it looks like at least one company in this space has …read more Continue reading Hackaday Links: March 10, 2024
A new report promotes preventing cyberattacks by using memory-safe languages and the development of software safety standards. Continue reading White House Recommends Memory-Safe Programming Languages and Security-by-Design
I have developed a tool that can find Maven Central JAR artifacts that contain classes from known vulnerable JAR artifacts. This includes but is not limited to fat (uber) JARs, JAR bundles, and artifacts tagged with the -all identifier.
In… Continue reading Should Maven Central artifacts containing known vulnerable artifacts be reported?
public static byte[] encrypt(String message, String password) throws Exception {
SecureRandom rand = new SecureRandom();
try (ByteArrayOutputStream out = new ByteArrayOutputStream()) {
try (DataOutputSt… Continue reading Does men in the middle is possible with this code : AES/CBC with HMAC? [closed]
Keep an eye on Dart and TypeScript in 2024, TIOBE Software CEO Paul Jansen suggests. Continue reading TIOBE Index News (January 2024): Programming Language of 2023 Goes to C#
We are integrating Google login in our app and we intend to use the idToken for authentication. We are already sending the idToken from the app to the back-end server, and intend to verify the token as explained at:
https://developers.goog… Continue reading Google Login with idToken and JWT (Java)
Are deserialization attacks possible when unmarshalling user input to non-vulnerable types using the JAXB unmarshaller?
We all know that deserializing user input to arbitrary types in Java leaves an application open to deserialization atta… Continue reading Are deserialization attacks possible when unmarshalling user input to non-vulnerable types using the JAXB unmarshaller?
In a mTLS(2-way-TLS)-Setup, my client is not able to access the client private key directly, bit only the public key. However it is able to generate a valid signature for any input challenge(produced with the right private key) by calling … Continue reading Hook into Client-Side TLS-Handshake of Java
Is there a way to write code to inspect Java methods’ bytecodes for signs of hooking (perhaps a branch to a different function etc)?
I want to be able to inspect either system classes or my own application’s classes for signs of hooking.
I… Continue reading Detect Java Method hooking in Android [migrated]
The rise of smaller languages may be due to the number of programmers increasing or to search engine ranking algorithms changing. Continue reading TIOBE Index News (December 2023): Smaller Programming Languages Are Rising in Popularity