security tag

47 questions


1 answers
128 views
0
Please tell me about Android encryption and key management.

In order to encrypt data and manage keys on Android, the developer page is written to use the Android Keystore System, but this key management seems to disappear in FactoryReset.Is there a way to keep...

2 years ago

1 answers
99 views
0
What are the risks of publishing server-side source code in open source? [Closed]

This question appears to be outside the scope defined in Help Center for stack overflow.Closed 6 years ago.6 years agoI would like to publish the site's repository on Github for student education so t...

2 years ago

1 answers
103 views
0
Is it difficult to encrypt media content with end-to-end encryption?

When I was looking at Twitter, I saw a tweet like thisIn principle, E2EE is very difficult for users to verify whether key exchange is done in a reliable way, media content is often not encrypted (une...

2 years ago

1 answers
154 views
0
How could a temporary RSA key be verified when it was signed with a public key affected by crypto export restrictions?

I don't know where to downgrade the key due to the FREAK attack.It seems that the public key is going to be downgraded, but Q1.Is it a server-only attack with a weak public key in advance because the ...

2 years ago

2 answers
104 views
0
Where do you store the bank account information for the web service?

When you are creating a web service and you have to keep your bank account information, where are you all stored? I'm in trouble because I didn't have any knowledge.I'd love to hear from you.If you pa...

2 years ago

1 answers
85 views
0
Is there a way to make sure that the jar file is built from the target source?

Various jar files can be added as dependencies by utilizing nexus repository such as maven central.Suddenly, I wondered if there was any way to verify that the jar file uploaded here was built from th...

2 years ago

4 answers
130 views
0
Understanding Password Hash Methods, Compatibility, and Matching Methods for Login Systems

I have a question about the login system.I understand the security and usage of encoding passwords using hash functions instead of encryption.I also understood that it is done several times by adding ...

2 years ago

1 answers
113 views
0
Is COPY tablename FROM stdin with csv in Postgres at risk of SQL injection?

I'm using python, psycopg2When the following code is executed, it reads the contents of the file once and writes it from standard input to DB.If there is a description in the file that allows SQL inje...


1 answers
91 views
0
Regarding the need for session_regenerate_id()

I'm a beginner in PHPPHP Session Hijacking Prevention Listed session_regenerate_id (TRUE);Is it necessary thatBecause I created a simple login system using my own session.If you can enter the username...

2 years ago

1 answers
81 views
0
What kind of study should I do to make malware? [Closed]

This question appears to be outside the scope defined in Help Center for stack overflow.Closed 2 years ago.Two years agoWhat kind of study should I do to make malware?Security?Is it python?Of course, ...

2 years ago
« - 2 - »

© 2024 OneMinuteCode. All rights reserved.