Trouble understanding hash_extension tool examples for hash length extension attack (C#)

I am trying to follow the example of how a hash length extension attack works using the article here: https://www.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks
In this, the author has a concrete exa… Continue reading Trouble understanding hash_extension tool examples for hash length extension attack (C#)

How to handle data that needs to be simple accessed and at the same time be secure?

I am currently in the process of developing a Teams bot to support commissioners of my company all around the world.
The requirements are for the commissioners to be able to write questions and get responses without any authentication with… Continue reading How to handle data that needs to be simple accessed and at the same time be secure?