Security notes / Anonymization notes: Difference between revisions
Jump to navigation
Jump to search
(Created page with "{{SecurityRelated}} <!-- Say : you want to provide data to someone for some analytics. : You know that it has personally identifiable fields, like username, IP address, lic...") |
mNo edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{#addbodyclass:tag_tech}} | |||
{{#addbodyclass:tag_security}} | |||
{{SecurityRelated}} | {{SecurityRelated}} | ||
Line 24: | Line 26: | ||
If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values. | If you know things about the input, like what it i - short, structured, it is easy to generate hashes for the most likely values, or even all values. | ||
This is a perfectly feasible attack for all the things just named - and so simple to you don't need any | This is a perfectly feasible attack for all the things just named - and so simple to you don't need any cryptographic knowledge. | ||
Latest revision as of 00:20, 22 April 2024
Security related stuff.
Securing services
Unsorted - · Anonymization notes · website security notes · integrated security hardware · Glossary · unsorted |