Skip to main content

Questions tagged [integrity]

Integrity is the property of preventing unauthorized modifications of an asset. In other words, integrity protects against the threat of tampering. It is one of the three key security properties of an asset, along with confidentiality and availability.

0 votes
0 answers
39 views

Does the chocolatey package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I usually trust my OS ...
Michael Altfield's user avatar
0 votes
1 answer
30 views

Does the cygwin package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? Fortunately, it's possible to ...
Michael Altfield's user avatar
1 vote
2 answers
101 views

Does the npm package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I see a lot of guides providing ...
Michael Altfield's user avatar
0 votes
1 answer
156 views

We have a device that contains multiple CPUs with low power. The main CPU ... ... needs to check if the second CPU(s) contain(s) valid (authorized) software. ... has access to a copy of the correct (...
Martin Rosenau's user avatar
0 votes
1 answer
104 views

I am playing around with Codeigniter (not really important, but just for sake of completeness) and I try different things. Do not ask for real word application, it is just for fun and also to learn. ...
Easy Mathematics's user avatar
0 votes
0 answers
80 views

Let's take an over-the-air update procedure for example. The client which needs updating downloads an update image from the source. It then performs some checksum calculation initially on the received ...
Engineer999's user avatar
1 vote
0 answers
160 views

Say you have a machine where the disk (eMMC) is non-removable like the Surface Go. If the UEFI configuration is protected with a long password, USB + network boot is disabled, and your user has a long ...
Jan Sommer's user avatar
1 vote
1 answer
76 views

Does PHP's Composer package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I see a lot of guides ...
Michael Altfield's user avatar
3 votes
1 answer
805 views

I'm making a simple web service that (skipping other details) allows a user to upload a message that can be retrieved by another user but can be decrypted only with a certain key. The message is ...
GameRaccoon's user avatar
3 votes
2 answers
173 views

Alice stated to Bob that X is her physical fingerprint. Problem: How to make Bob trust that X is really a physical fingerprint of Alice? How to prevent Alice from creating multiple identities (let's ...
Muhammad Ikhwan Perwira's user avatar
10 votes
4 answers
3k views

I need to receive some important documents from another person. It may be important to be able to prove (in justice) which files exactly I received from that person at a specific moment. My first ...
alex's user avatar
  • 201
0 votes
0 answers
15 views

I use linux and tend to distro hop a lot. I've noticed often that the distributions offer that you verify the download with a sha256sum hash and a GPG key. My understanding is that a file, e.g. a ...
dbqp's user avatar
  • 21
1 vote
1 answer
182 views

IPsec is said to have "partial" replay protection because if a packet arrives outside the window, we can't track it, so we have to make a choice: do we risk and accept it, or do we drop it? ...
allexj's user avatar
  • 537
0 votes
1 answer
125 views

Here the author writes "sender authentication". Does he mean data origin authentication? Or is sender authentication something different? Wikipedia says that "data origin authentication ...
allexj's user avatar
  • 537
2 votes
0 answers
119 views

With IPsec transport mode we CAN'T have integrity of variable fields (eg TTL and checksum). Why is it a problem? Is it? What could be the attack? I think TTL expire or checksum modification (so both ...
allexj's user avatar
  • 537

15 30 50 per page
1
2 3 4 5
22