Skip to main content

Questions tagged [encryption]

Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.

11 votes
2 answers
2k views

Setup I have a 4-copy backup strategy, which I am currently transitioning to: two local drives (external SSD + external HDD) and two cloud backup services. I also have several retired old HDDs in a ...
Join_Where's user avatar
0 votes
1 answer
74 views

It is often stated that encrypted data cannot be meaningfully compressed, because encryption produces output that appears random and lacks redundancy. In practice, this is why systems typically ...
Muhammad Ikhwan Perwira's user avatar
8 votes
2 answers
2k views

I am talking about two solutions: A. BitLocker with a strong password. That's my current setup. I feel no one can access my data, even if they steal my laptop. They are blocked at step 1 when they ...
CodePanda's user avatar
  • 181
0 votes
2 answers
284 views

I was thinking that using GPG/PGP to encrypt and sign emails is a good, secure way for email privacy and integrity. The other way I stumbled across this comment on a lawyer's contact page: "We ...
phunsoft's user avatar
  • 211
2 votes
1 answer
152 views

I’m developing a web application that requires interaction with multiple third-party APIs. I need to ensure that the API keys and secrets are stored securely and accessed safely by the application ...
Pustam Raut's user avatar
8 votes
2 answers
1k views

I am running Linux on my laptop with disk encryption. In addition, I want to protect BIOS settings and startup with a password, and I guess adding a password to GRUB entry editing and command-line won'...
user1326024's user avatar
1 vote
1 answer
76 views

I have done some work on a password recovery tool for credentials stored in Firefox. This is largely based on code found in the LaZagne project (https://github.com/AlessandroZ/LaZagne). The latest ...
Secure Aviator's user avatar
0 votes
0 answers
124 views

I'm struggling to come up with a better encryption model for this scenario: User is mobile app user Small (USA) company with small budget wants to store data encrypted at rest per user in cloud ...
dotmainframe's user avatar
2 votes
1 answer
268 views

If I wipe a SSD twice with Killdisk, then do a clean install of Windows 11, then do full disk encryption with Veracrypt, then clone this disk to several wiped external SSDs, can I use the same ...
Mark Donnell's user avatar
0 votes
1 answer
146 views

Context I have a GUI application with a proprietary scripting language. There is a library that starts a python child process from the GUI which listens on a tcp socket and runs any script command ...
Kayson's user avatar
  • 101
1 vote
1 answer
126 views

I'm in the processes of setting up backups and recovery for my own personal system. Currently a basic tar of the system seems sufficient (in the future I might investigate incremental backups). As ...
Sam Coutteau's user avatar
0 votes
1 answer
112 views

I use NICE-DCV and using this as a realistic example to ask my question - upon connecting to a session on the server which is RHEL-8 from a client win11 pc, the client pc gets this security popup {I ...
ron's user avatar
  • 453
0 votes
1 answer
141 views

Context: CloudKit is a framework that lets app developers store key-value data, structured data, and assets (large data stored separately from the database, such as images or videos) in iCloud. ...
user134238's user avatar
0 votes
0 answers
82 views

Disclaimer:- I am not a cybersecurity or computer science student. I am just curious about this scenario and couldn't find/understand how the methods used ensure the safety of the connection are ...
Jesse Alexander jr.'s user avatar
0 votes
3 answers
129 views

From this post, the answer to my question seems like: The short answer to this is "no you don't" unless it's for some silly class assignment or something. My silly something is the ...
pqzpkaot's user avatar
  • 103

15 30 50 per page
1
2 3 4 5
400