Difference between revisions of "Security notes / Anonymization notes"

From Helpful
Jump to: navigation, search
(Created page with "{{SecurityRelated}} <!-- Say : you want to provide data to someone for some analytics. : You know that it has personally identifiable fields, like username, IP address, lic...")
 
m
 
Line 24: Line 24:
  
 
If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values.  
 
If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values.  
This is a perfectly feasible attack for all the things just named - and so simple to you don't need any crypto knowledge.
+
This is a perfectly feasible attack for all the things just named - and so simple to you don't need any cryptographic knowledge.
  
  

Latest revision as of 00:55, 26 April 2022

Security related stuff.

Practical


Theory / unsorted


  • Anonymization notes


how to do a login system badly
how to do encryption badly
Disk and file encryption notes