Skip to main content
Ja1024's user avatar
Ja1024's user avatar
Ja1024's user avatar
Ja1024
  • Member for 2 years, 9 months
  • Last seen this week
  • Germany
77 votes
Accepted

Filter arbitrary code for blacklisted keywords except on commented lines

74 votes
Accepted

What stops a malicious user from hitting an endpoint with falsified data from the console of a webpage?

63 votes

Does the recommendation to use password managers also apply to corporate environments?

58 votes
Accepted

What prevents a browser from saving and tracking passwords entered to a site?

52 votes
Accepted

Can trusted timestamping be faked by altering some bytes within the document?

45 votes
Accepted

Is it secure to block passwords that are too similar to other employees' old passwords?

44 votes

Why don't we use HTML password inputfields for usernames and 2FA codes in the front-end of web applications?

43 votes
Accepted

Why "Only send non-temporary passwords over an encrypted connection or as encrypted data"?

43 votes
Accepted

What's the point of certificates in SSL/TLS?

43 votes
Accepted

Does public key cryptography provide any security advantages, or even just a different security model, over symmetric cryptography?

41 votes

Is it acceptable to ignore potential XSS payloads if they are not executed on our side?

40 votes
Accepted

What prevents applications from misusing private keys?

39 votes

Is SQL Injection possible if we're using only the IN keyword (no equals = operator) and we handle the single quote

39 votes

Web application contains a link to a non-existing domain, is this a vulnerability?

39 votes

Enabling a user to revert a hacked change in their email

38 votes
Accepted

How to deal with monitoring software on a personal PC used for work?

38 votes
Accepted

Why do best practices recommend against adding your own pepper to passwords before hashing?

33 votes

How to receive large files guaranteeing authenticity, integrity and sending time

33 votes
Accepted

How many possible MD5 hashes are there, 16³²? Or do MD5 checksums have error correction (in which case <16³² possible hashes)?

32 votes
Accepted

Should the generation method of password-reset-tokens be kept secret?

32 votes
Accepted

Are there any security concerns with this authentication flow?

31 votes
Accepted

Why are TOTP seeds rarely leaked in data breaches?

30 votes

Determining Entropy in PHP

30 votes

Securing Transactional Email: User Input Escaping for a email subject

30 votes
Accepted

Is my encryption format secure?

29 votes
Accepted

What are the preferred ways to exchange public keys physically?

28 votes
Accepted

Cryptographic strength of VeraCrypt

28 votes
Accepted

Why aren't passwords also hashed on client side on desktop applications?

27 votes
Accepted

Securely storing a password for matching against its substrings

27 votes

Security implications to removing delay on empty passwords?

1
2 3 4 5
23