Client-side encryption of data, but the server can also add data without reading stored data

For a new application I’d like to store messages for each user’s account on a centralized server.
The user accesses the application through a SPA javascript web app through their browser.
These messages:

Should be unreadable by the server… Continue reading Client-side encryption of data, but the server can also add data without reading stored data

Does hashing client-side increase attack surface (assuming TLS and serverside salt+hash)? [duplicate]

This question asks whether one should hash on the client or the server. I want to know if there is any reason, aside from having to maybe handle one extra hashing library (if it’s not already in your security stack), why you wouldn’t want … Continue reading Does hashing client-side increase attack surface (assuming TLS and serverside salt+hash)? [duplicate]

gpg –quick-generate-key user-id [algo [usage [expire]]] – Any way to include a comment?

I am doing some unattended key generation using –quick-gen-key and –quick-add-key. I am not clear if the user-id mentioned in the man page offers a way to include a comment:
–quick-generate-key user-id [algo [usage [expire]]]

I usuall… Continue reading gpg –quick-generate-key user-id [algo [usage [expire]]] – Any way to include a comment?

Theoretical question with regard to weak password based KDF & high entropy input

I know this question is theoretical however I would like some thoughts from a security perceptive.

Take this thought:

1) I generate a high entropy, cryptographically secure string of bits (256-bits of entropy)
2) I use this entropy as a … Continue reading Theoretical question with regard to weak password based KDF & high entropy input