|
- privacy - If I delete my routers history can my ISP still provide it . . .
If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?
- What information can my ISP see when I visit a website?
The long answer is more complicated If you use encryption wherever possible, payloads would not be viable to view (it may be possible to decrypt a packet, with enough time and processing power, but it's not a viable use of resources) What they can most definitely see is the information of where it's going
- How can a Microsoft unsuccessful sign-in trigger a 2FA request?
I was certain I'd find a question asking this, but a search didn't return any results I have 2FA enabled on my Microsoft account, which requires me to approve all sign-ins using the Microsoft
- Is it possible to make time-locked encrytion algorithm?
I'm not sure if what I'm asking is even a valid question but here goes Would it be possible to add a mechanism to an encryption algorithm that would mean it had to be a certain time of the day or a
- Constant time implementations of crypto algorithms
To protect against cache attacks (side channel attacks) generally constant time crypto implementations are advised In some cases DJB released new algorithms (chacha) that are designed with this in mind (as one of objectives)
- windows - Finding date of last network access - Information Security . . .
A simple (possibly verifiable) way to do this is looking for the index dat files that are present on the machine Even if the user deletes all the cookies, and deletes all temporary files, and removes most traces of a connection, the index dat file gets updated to reflect this behavior - and the latest modification date of the file will tell us when it was last used by IE, and thus give the
- hash - Why arent passwords also hashed on client side on desktop . . .
On a server, you know the hardware and can find a good balance between the strength of the resulting hash, the use of available resources and the time a user has to wait Servers also tend to enough CPU cores and RAM to use reasonably strong cost parameters This is much more difficult when you run the hashing on a client device
- When do I use IPsec tunnel mode or transport mode?
One other consideration: some routing protocols do not work over tunnel mode (those that use multicast or broadcast to establish adjacency or to swap routes) In those cases, you want to use GRE or mGRE to establish your tunnel and protect with transport mode IPSec See Cisco's reference implementation of DMVPN (mGRE, IPSec in Transport Mode, NHRP, OSPF) for a concrete example and explanation
|
|
|