Can token decryption endpoint response codes variability lead to security vulnerabilities?

To clarify the question, here’s our case:
We generate encrypted tokens by applying AES-CBC (256 bit) and Base64 to payload:
encrypted_token = Base64.encode(AES_CBC_256.encrypt(key, iv, payload)).
These encrypted tokens are publicly availab… Continue reading Can token decryption endpoint response codes variability lead to security vulnerabilities?

User-Controlled Encryption in web app. How to Implement Encrypted Content Sharing Among Friends?

I’m working on idea for a project the goal is to allow a user to share their encrypted content with friends while ensuring the server and none friends maintains zero knowledge of the actual content.
Here’s an example structure of a user:
U… Continue reading User-Controlled Encryption in web app. How to Implement Encrypted Content Sharing Among Friends?

User-Controlled Encryption in web app. How to Implement Encrypted Content Sharing Among Friends?

I’m working on idea for a project the goal is to allow a user to share their encrypted content with friends while ensuring the server and none friends maintains zero knowledge of the actual content.
Here’s an example structure of a user:
U… Continue reading User-Controlled Encryption in web app. How to Implement Encrypted Content Sharing Among Friends?