Questions tagged [distributed-computing]
The distributed-computing tag has no summary.
32 questions
2
votes
1
answer
251
views
Non-interactive multi key encryption and decryption
I need some serious suggestions on my protocol, specifically for decryption.
So the scenario is Organizations A and B encrypt their employees' records with their respective public keys and store them ...
1
vote
2
answers
386
views
How to select a random node when nodes are untrusted in a distributed network?
Assume in a distributed network, where the nodes are not trusted and are identified by their public keys, we intend to select one of them in a random process. In such a situation, all of the nodes ...
0
votes
2
answers
199
views
Secure Authentication of Technical User to a Network-Appliance-HSM
Let's assume we have an internal environment consisting of some distributed systems, one central system and an internal PKI. The central system is serving a cluster of HSMs that shall be accessable by ...
0
votes
1
answer
291
views
Methods to Prove Data Authenticity from Potentially Compromised Sources?
I've been thinking about this problem for some time and I wanted to ask if there are any known methods, or research papers, about how to prove "authenticity" or correctness of data ...
3
votes
1
answer
288
views
Attacks on decentralised networks by running a fleet of nodes with modified software
At least some decentralised networks purported to provide anonymity are vulnerable to this attack: the original software is modified to allow tracking/logging/whatever, and a large amount of nodes ...
1
vote
1
answer
466
views
Blockchain + shared unused bandwidth as the proxy front = ddos mitigated?
Pentesting the new webapp that we have developed before having an external source have a go at it and give us a risk assessment. Now we have come to the portion right at the end; DDOS.
For the most ...
1
vote
0
answers
675
views
What is the reason why I am not able to able to use Maltego unless I disable port 135 (RPC) inbound on my Windows computer?
I originally attempted to use Maltego before making any configuration changes to my firewall; however, I was being blocked because I had port 135 disabled which is what Windows uses for RPC. After ...
1
vote
0
answers
129
views
How to secure unique identification of physical resources in a distributed system?
I'm attempting to build a mechanism to prevent frauds and provide traceability of physical resources in a distributed system. The idea is straightforward: the resource travels hop-by-hop on a network ...
2
votes
0
answers
191
views
How easily could a global network of machines break cryptography? [closed]
Suppose the NSA through legal means, or a malware group through illegal means has access to enormous computational resources via a backdoor into all Microsoft Windows machines (or some significant ...
0
votes
1
answer
200
views
Somebody trying to ssh attack via hosting services on me. What is the best response? [duplicate]
I am having a lot of failed ssh authentication requests for the past two days, from various service providers. It seems somebody is intent on breaking into my computer.
I am using Ubuntu on a Dell ...
-1
votes
2
answers
206
views
Can cryptography be used to compare and verify time-sensitive responses from untrusted web servers? [closed]
In card games like poker it is critical that players do not know the hands of the other players until they simultaneously show their cards to see who has won.
Is there a cryptographic technique to ...
3
votes
2
answers
528
views
Is the Ethereum blockchain truly a tamper-proof way to deploy distributed applications?
The Ethereum website says that it provides a "cryptographically secure, decentralized, tamper-proof network" on which applications written in the Solidity contract language could be deployed. (https://...
6
votes
1
answer
355
views
What are the drawbacks of non-PKI or distributed Key Management systems?
I just came across the Milagro project which seems to be solving some of the limitations introduced by PKI (centralized trust authorities with single point of failure hard-to-revoke root keys, using X....
18
votes
3
answers
18k
views
How does Jami (formerly Ring.cx) really work, and how secure is it?
Jami calls itself "ultimate privacy and control for your voice, video and chat communications". But forums online mentioned in passing (little depth) that it uses bad cryptography protocols ...
11
votes
2
answers
980
views
Why is e-voting still a problem?
Electronic voting has been considered technical infeasible for a long time. And recently I watched a video from the channel Computerphile on YouTube where they bring up all the problems that come ...