Questions tagged [identification]
The identification tag has no summary.
89 questions
0
votes
1
answer
104
views
help understanding server identity fingerprint [hashing vs encryption process & terminology]
I use NICE-DCV and using this as a realistic example to ask my question - upon connecting to a session on the server which is RHEL-8 from a client win11 pc, the client pc gets this security popup {I ...
17
votes
4
answers
5k
views
How are users traced via their IP when ISPs use NAT?
Since my ISP uses NAT, I will share the same public facing IP address with other customers.
If I go to a website and perform an action (posting a message, uploading an image, etc.) then my IP address ...
1
vote
1
answer
158
views
Is electronic signature a proper/sufficient mean for identification/authentication?
We have received an electronically signed GDPR data request from a person who has only provided his name and surname. We wanted to be sure that this person is who he claims he is, so we have asked to ...
0
votes
0
answers
190
views
Retrieving Android phone's identifiers
I will be publishing a fingerprinting app that shows its user how much access to their Android phone's identifiers it has. I haven't started writing it because I need to understand how can any Android ...
0
votes
1
answer
2k
views
Identifying a ransomware with .mkp file extensions
Yesterday, a ransomware hit my PC. I didn't pay the ransom and didn't comply with what the attackers were asking for and I wiped everything and every drive on my PC and then reinstalled my stuff from ...
0
votes
1
answer
1k
views
Fraud Detection - 2FA Bypass Methods and SIM Cloning
I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known ...
0
votes
1
answer
804
views
How malware file signature is generated?
How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc?
And can the MD5 or SHA256 be considered a file signature for a ...
1
vote
1
answer
187
views
How can websites fingerprint the company I work for?
During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies ...
1
vote
1
answer
3k
views
What traces are left on a USB stick after using it?
If one uses a FAT32-formatted USB stick on Windows, Linux, or Android, would there be a way to determine on which computer the USB stick was used by examining the USB stick?
I know OS can log which ...
3
votes
1
answer
1k
views
Guidance on Storing Email Addresses as Hashes
I am building an application where one user (User A) can store a "query" of another user (User B) that may or may not exist in the system. This query can be done by email address.
The ...
0
votes
0
answers
241
views
How reliable is a mathematical model of a human fingerprint for identification?
How reliable is a mathematical model of a human fingerprint for identification?
I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require ...
0
votes
1
answer
278
views
Can we prevent users from generating a QR code with edited information
Currently there is this design of two apps that work together:
Proof app: On customers phone, takes in a textcode and creates a QR code
Scanner app: On hosts phone, Scans the QR code and displays ...
3
votes
1
answer
2k
views
Nonprofit organizations asking me to email them a photo of my driver's license
Recently I've had two nonprofit organizations ask me to email them a photo of my driver's license. No money is changing hands, and both of these are legitimate and well-known nonprofits.
Organization ...
1
vote
1
answer
1k
views
May I use OAuth2 for non third-party applications?
I need some help to understand my problem.
I'm studying a way to provide authentication for my applications.
My scenario:
I have a set of APIs with restricted access and users that will be ...
0
votes
2
answers
395
views
What is the current state of author recognition software and what can be done about it?
I'm curious what the current state of author recognition software is, i.e. software that detects the author of a certain anonymous text based on a certain pool of texts obtained from elsewhere. This ...