Questions tagged [encryption]
Encryption is the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
5,988 questions
11
votes
2
answers
2k
views
Should I encrypt local backup drives that never leave my home?
Setup
I have a 4-copy backup strategy, which I am currently transitioning to: two local drives (external SSD + external HDD) and two cloud backup services. I also have several retired old HDDs in a ...
0
votes
1
answer
74
views
Can compression be used to distinguish encrypted data from raw binary data?
It is often stated that encrypted data cannot be meaningfully compressed, because encryption produces output that appears random and lacks redundancy.
In practice, this is why systems typically ...
8
votes
2
answers
2k
views
If someone has physical access to my laptop with bitlocker with TPM, can they access the data?
I am talking about two solutions:
A. BitLocker with a strong password. That's my current setup. I feel no one can access my data, even if they steal my laptop. They are blocked at step 1 when they ...
0
votes
2
answers
284
views
Is using GPG/PGP for email encryption and signing still a secure method?
I was thinking that using GPG/PGP to encrypt and sign emails is a good, secure way for email privacy and integrity. The other way I stumbled across this comment on a lawyer's contact page:
"We ...
2
votes
1
answer
152
views
How can I securely store and manage API keys in a multi-environment web application?
I’m developing a web application that requires interaction with multiple third-party APIs. I need to ensure that the API keys and secrets are stored securely and accessed safely by the application ...
8
votes
2
answers
1k
views
What are the security implications of having the same password for BIOS startup, GRUB editing, LUKS2 encryption and the user account?
I am running Linux on my laptop with disk encryption. In addition, I want to protect BIOS settings and startup with a password, and I guess adding a password to GRUB entry editing and command-line won'...
1
vote
1
answer
76
views
Changes in Firefox Credential Storage version 146.0+
I have done some work on a password recovery tool for credentials stored in Firefox. This is largely based on code found in the LaZagne project (https://github.com/AlessandroZ/LaZagne). The latest ...
0
votes
0
answers
124
views
Not quite end-to-end encryption: encryption models where backend needs to do processing outside of a user session
I'm struggling to come up with a better encryption model for this scenario:
User is mobile app user
Small (USA) company with small budget wants to store data encrypted at rest per user in cloud ...
2
votes
1
answer
268
views
Can I use the same password if I clone a Veracrypt disk? [closed]
If I wipe a SSD twice with Killdisk, then do a clean install of Windows 11, then do full disk encryption with Veracrypt, then clone this disk to several wiped external SSDs, can I use the same ...
0
votes
1
answer
146
views
What is the best way to authenticate and encrypt a simple, end-user started, ephemeral tcp server?
Context
I have a GUI application with a proprietary scripting language. There is a library that starts a python child process from the GUI which listens on a tcp socket and runs any script command ...
1
vote
1
answer
126
views
Managing keys for encrypted system backups and recovery
I'm in the processes of setting up backups and recovery for my own personal system. Currently a basic tar of the system seems sufficient (in the future I might investigate incremental backups).
As ...
0
votes
1
answer
112
views
help understanding server identity fingerprint [hashing vs encryption process & terminology]
I use NICE-DCV and using this as a realistic example to ask my question - upon connecting to a session on the server which is RHEL-8 from a client win11 pc, the client pc gets this security popup {I ...
0
votes
1
answer
141
views
Use of assymetric encryption in Apple CloudKit (iCloud)
Context:
CloudKit is a framework that lets app developers store key-value data, structured data,
and assets (large data stored separately from the database, such as images or videos) in
iCloud. ...
0
votes
0
answers
82
views
How do websites ensure security of the data transferred when the connection goes through third parties? [duplicate]
Disclaimer:- I am not a cybersecurity or computer science student. I am just curious about this scenario and couldn't find/understand how the methods used ensure the safety of the connection are ...
0
votes
3
answers
129
views
Asymmetric encryption for messages of arbitrary length
From this post, the answer to my question seems like:
The short answer to this is "no you don't" unless it's for some silly class assignment or something.
My silly something is the ...