Can I spoof my user agent so that the type of device I’m using doesn’t show up?

I was looking into spoofing a user agent but all that has come up so far is spoofing the browser type. However I can still see what kind of device I am using (tbh I’m not really even sure why someone would want to spoof the b… Continue reading Can I spoof my user agent so that the type of device I’m using doesn’t show up?

Posted in Uncategorized | Tagged

Can a malicious SSH server successfully *pretend* to know a client’s public key?

Yes, I know that after giving an SSH public key to someone else, one should always assume that it might have been swiftly published somewhere. (For instance, give your SSH public key to GitHub, and GitHub will publish it. E.g… Continue reading Can a malicious SSH server successfully *pretend* to know a client’s public key?

How can an end-user verify the authenticity of a third-party authentication provider’s login form

Given the ubiquitous use of third party authentication providers in web apps today, how can end-users verify the authenticity of the login forms that collect their credentials? What’s to stop a malicious website from displayi… Continue reading How can an end-user verify the authenticity of a third-party authentication provider’s login form