For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Given this secure setup, which attacks are possible?
(
security.stackexchange.com
)
1 point
by
EGreg
on March 19, 2025
|
past
Lotus Notes: Changing picture as characters entered into password
(
security.stackexchange.com
)
2 points
by
fidotron
on Sept 12, 2024
|
past
Why is the BCrypt text "OrpheanBeholderScryDoubt"
(
security.stackexchange.com
)
3 points
by
cpeterso
on Aug 17, 2024
|
past
Does CrowdStrike Falcon get validated by the Windows kernel as being crash-free?
(
security.stackexchange.com
)
1 point
by
firebaze
on July 22, 2024
|
past
How long does malware last "in the wild"?
(
security.stackexchange.com
)
4 points
by
azeemba
on May 19, 2024
|
past
[2020]Is this email asking me $100 for security flaw in my website a scam?
(
security.stackexchange.com
)
2 points
by
elsadek
on Feb 22, 2024
|
past
Is it possible to get hacked if my bcrypt hash is publically known? (2016)
(
security.stackexchange.com
)
1 point
by
mnming
on Jan 14, 2024
|
past
How to prove someone sent an email to you?
(
security.stackexchange.com
)
2 points
by
aragonite
on Jan 8, 2024
|
past
"Diffie-Hellman Key Exchange" in Plain English
(
security.stackexchange.com
)
2 points
by
wbsun
on Nov 1, 2023
|
past
How could a security control introduce a privacy issue?
(
security.stackexchange.com
)
1 point
by
azeemba
on Oct 17, 2023
|
past
How did Firefox get my passwords?
(
security.stackexchange.com
)
4 points
by
elsadek
on Oct 2, 2023
|
past
Why is the BCrypt text “OrpheanBeholderScryDoubt”?
(
security.stackexchange.com
)
2 points
by
jryb
on July 10, 2023
|
past
Spying on a smartphone remotely by the authorities: feasibility and operation
(
security.stackexchange.com
)
117 points
by
joebiden2
on July 8, 2023
|
past
|
96 comments
Why use OpenID Connect instead of plain OAuth2?
(
security.stackexchange.com
)
215 points
by
nathan-wailes
on June 26, 2023
|
past
|
78 comments
Using hashed trigrams to search over encrypted data
(
security.stackexchange.com
)
2 points
by
joebiden2
on April 28, 2023
|
past
Is RAM wiped before use in another LXC container?
(
security.stackexchange.com
)
309 points
by
Aachen
on April 5, 2023
|
past
|
168 comments
Malicious code somehow hidden with whitespace?
(
security.stackexchange.com
)
1 point
by
BerislavLopac
on Feb 22, 2023
|
past
Why is 1Password sign-in to new device secure without MFA?
(
security.stackexchange.com
)
2 points
by
firebaze
on Feb 10, 2023
|
past
Are texted 2FA security codes deliberately easy to remember? (2017)
(
security.stackexchange.com
)
2 points
by
jazali
on Feb 7, 2023
|
past
Code Obfuscation
(
security.stackexchange.com
)
1 point
by
elsadek
on Nov 28, 2022
|
past
Should a bank be able to shorten your password without your approval?
(
security.stackexchange.com
)
2 points
by
elsadek
on Nov 25, 2022
|
past
|
1 comment
Self-Signed Certificates and Key Ceremonies
(
security.stackexchange.com
)
3 points
by
fortym2
on Oct 14, 2022
|
past
How can I explain SQL injection without technical jargon? (2012)
(
security.stackexchange.com
)
1 point
by
segfaultbuserr
on Sept 29, 2022
|
past
|
1 comment
Could logless VPNs be traced?
(
security.stackexchange.com
)
6 points
by
rzk
on Sept 26, 2022
|
past
|
1 comment
What to search for in open source code to be sure there isn't malicious code?
(
security.stackexchange.com
)
14 points
by
behnamoh
on Aug 7, 2022
|
past
|
2 comments
Why are certificates limited in time?
(
security.stackexchange.com
)
1 point
by
doener
on May 28, 2022
|
past
“Can the VM be infected?”
(
security.stackexchange.com
)
1 point
by
kurmouk
on Jan 26, 2022
|
past
Hash Shucking
(
security.stackexchange.com
)
2 points
by
tosh
on Jan 19, 2022
|
past
Is Xcode vulnerable due to Log4j?
(
security.stackexchange.com
)
3 points
by
putlake
on Dec 26, 2021
|
past
Pattern to allow multiple persons to decrypt a document, without sharing the key
(
security.stackexchange.com
)
3 points
by
Dutchie2020
on Nov 29, 2021
|
past
|
1 comment
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.