security.didici.cc

reflected XSS in error page

3 minutes ago

OWASP ZAP identifies the following as a reflected XSS. The JavaScript itself is never rendered as JavaScript, only displayed as text to a user. I am curious if this truly is classed as an XSS, and is it exploitable? This is the page source, as you can ...

mana-toolkit proplem ( using kaili linux 3.2017

25 minutes ago

I get this error while creating the wlan using this code bash /usr/share/mana-toolkit/r
un-mana/start-nat-simple.
sh wlan1: ERROR while getting interface flags: No such device Configuration file: /etc/mana-toolkit/hostapd
-mana.conf Could not read interface ...

mana-toolkit problem using kaili linux 3.2017

25 minutes ago

I get this error while creating the wlan using this code: bash /usr/share/mana-toolkit/r
un-mana/start-nat-simple.
sh wlan1: ERROR while getting interface flags: No such device Configuration file: /etc/mana-toolkit/hostapd
-mana.conf Could not read interfac ...

Security implications of server-side caching

1 hour ago

To improve app performance, sometimes caching is used. However that keeps things in memory, so if your database was secured but you have stuff in a local cache, then it seems like you lose the benefit of that security. Wondering what the other security i ...

Security implications of server-side in-memory caching

1 hour ago

To improve app performance, sometimes caching is used. However that keeps things in memory, so if your database was secured but you have stuff in a local cache, then it seems like you lose the benefit of that security. Wondering what the other security i ...

I found this javascript on a webpage, is it a browser based cryptominer?

2 hours ago

I found a very strange javascript on a page. It was encoded in a large base64 string, then enclosed in atoi() and eval()d. Like this: eval(atob("0a
W9u...UuYWRkR")) I decoded it and beautified the code. I admit it is quite a big script, but the code w ...

Are we PCi Compliance?

2 hours ago

If we have a commercial software for handle recurring billing but only store cardholder data and then are sended a file to ACH with the payments to apply. Are we PCi Compliance?

Are we PCI compliant?

2 hours ago

We have a commercial software for handling recurring billing but only store cardholder data and then send a file to ACH with the payments to apply. Are we PCI compliant?

Proper way to protect a logs directory

3 hours ago

When hardening a WAS (in this case I am using Tomcat), OWASP recommends to apply this Linux permissions to the logs directory: Make sure tomcat user has read/write access to /tmp and write (300 - yes, only write/execute) access to CATALINA_HOME/logs ...

Buffer Overflow payload in param file given

3 hours ago

I'm trying to exploit this BOF: The vulnerability is in the debug function and I managed to get into it debugging with GDB but...Hex values cannot be read! And I don't know how to use the NOP instruction and also the return address to create the payload. ...

Is CMOS the only hardware that's active when fully shut down?

4 hours ago

is CMOS the only hardware that's active when fully shut down/ even without power? or is there any other hardware?

What is command or way to connect to router ?

4 hours ago

I'd like to simulate the behaviour of how the router will allow the outside intruder to LAN, if someone knowing my dynamic ip adress. So for that purpose let's say that I know my ip address then e.g. abc.def.ghj.klm : 80, then typing that to my browser ad ...

Does no response on port 80 mean that my router is blocking incoming connections?

4 hours ago

I'd like to simulate how my router will allow an outside intruder into my LAN if they know my dynamic IP address. So for that purpose, let's say that I know my IP address to be abc.def.ghj.klm: 80. Typing that into my browser address bar doesn't retrieve ...

Where can I get hashes of ransomware malware for research purposes? [on hold]

7 hours ago

I'm a cybersecurity researcher, and I need a lot of hashes of ransomware malware so I can locate different ransomware binaries. I had a couple of resources but I need more. I have a way to check if they are actually ransoms, so every hash you can address ...

does Previewable option in file managers can execute "Malware"?

8 hours ago

I am using Nemo file manager and i enabled 'Previewable files' option that shows videos/photos files with their thumbnails, i dont know exactly how files managers generate thumbnails, but am wondering if generating process can execute malware/backdoor e ...

Can the previewable option in file managers execute malware?

8 hours ago

I am using Nemo file manager and I enabled the Previewable files option that shows video/photo files with their thumbnails: I don't know exactly how files managers generate thumbnails, but I am wondering if the generation process can execute malware em ...

Where can I get ransom hashes

9 hours ago

I'm a cyber security researcher, and I need a lot of ransom hashes. I had couple of resources but I need more. I have a way to check if they are actually ransoms, so every hash you can address me to will be helpful.

Where can I get hashes of ransomware malware?

9 hours ago

I'm a cyber security researcher, and I need a lot hashes of ransomware malware. I had couple of resources but I need more. I have a way to check if they are actually ransoms, so every hash you can address me to will be helpful.

How to bounce an email back to the sender in Outlook?

9 hours ago

There is a moron (not spammer) that keeps sending me unwanted emails. Currently those emails are directed to the junk folder in Outlook, but I want a different solution. I want to bounce the emails back to the sender, essentially telling the person the em ...

Remote Access Networking

9 hours ago

My computer was placed into a lan network without my consent. Since that happened I have absolutely NO control over any aspect of the system. I have tried everything to regain control with no results. I do know I am in stack exchange, and visual studio is ...

Search Engines Can't reach dark web

9 hours ago

I have a question related to the search engines such as Google, Yahoo, Bing ..., why can't they reach dark web and archive it's contents to be appear with their results. I have posted this in security forum So I can get the answers based on security resp ...

Why can't search engines reach the dark web?

9 hours ago

Why can't search engines such as Google, Yahoo and Bing reach dark web and archive it's contents to be appear in their results?

How secure (about spyware/backdoor in it) is LibreOffice? should i star using OpenOffice?

9 hours ago

I'm using LibreOffice now, and i'm encrypting files of LO Write with VeraCrypt that have very personal content and i want to keep it secret. But i read about LO send to his web SU MUCH information, and i read a entry (that i cannot find gain right now) th ...

How secure (about spyware/backdoor in it) is LibreOffice? Should i start using OpenOffice?

9 hours ago

I'm using LibreOffice now, and I'm encrypting files of LO Write with VeraCrypt that have very personal content and I want to keep it secret. But I read about LO send to his web SO MUCH information, and I read an entry (that I cannot find again right now) ...

AMT hacking and the like

11 hours ago

I have heard there are methods of hacking a personal computer using the Intel AMT exploit. I have a hacked computer in which the hack SURVIVES the re-installing of the OS(Windows 8), i.e., it's still hacked after formatting. Are there ways to achieve th ...

What if the Certificate Authority is starts forging the TLS certs?

11 hours ago

If in any case, there is CA B who signs the certificate for abc.com but the CA B is forging the certificates and signing the certificates at their own will and people are not aware about it. How do we find that if the certificate signed by the CA B is a ...

Against what scenarios should I backup my database?

15 hours ago

I'm building a website with very sensitive data stored in my database. Losing any of it is not an option, and that's why I'm thinking to do an incremental backup every hour or so. I work on it alone, so I use only one database super-user (am I wrong?). Ho ...

What is the limit of the number of keys an HSM supports?

15 hours ago

I am pretty new to HSMs, and I need an HSM that supports a large number of keys (around few hundred thousand at least). Is there a limit in a number of keys an HSM support? I can't seem to find this information anywhere, I get the performance data (meas ...

What is the reason for the Safe Mode on or off? (in PHP)

17 hours ago

When it shows up in the Shell ("safe_mode = off not secure") what'
;s the reason ? And when ON what measures should be taken to the server to be ON

Switching connection encription on fly (browsers padlock)

18 hours ago

On youtube, connection is encrypted (green padlock). However I found my self in a situation that when I click on for example, a comment that contains url to a different website (on which connection is not encrypted), then the padlock on youtube changes to ...

Switching connection encryption on the fly (browser padlock)

18 hours ago

On Youtube, the connection is encrypted (green padlock). However I found myself in a situation that when I click on for example a comment that contains a URL to a different website (on which the connection is not encrypted), then the padlock on Youtube ch ...

RSA fingerprint vulnerability

18 hours ago

for exemple in connexion SSH Is there a vulnerability risk here with respect to the RSA fingerprint? How can i fix it and make sure that your connection is secure?

someone hack my device and router

18 hours ago

I see my router firewall history.l don't know they want hack my iPhone or use my hack iphone my router. They use a Android tablet to hack. They use a code to get in. This must mean they have cracked my router firewall.

Remove domain from web filter blacklists

20 hours ago

A domain with a checkered past I work at a company that purchased a .com domain around a year ago, and it uses this domain for its web site and e-mail now. However, the previous owner had a site (last online several years back) on the domain which was p ...

Is it secure to transfer certificates from Service 1 to Service 2 over HTTPS?

21 hours ago

I need to transfer SSL certificates (including their private keys) between two services over HTTPS. For example, service 1 makes a PUT REST call to service 2 over HTTPS. Request Payload = The certificate including the private key. Is that secure? Is the ...

What are the risks of allowing business users direct production database access?

21 hours ago

I work for a small-ish company that currently allows almost everyone to access production databases and run SQL queries (it's a "culture" thing). I need to sell the C-Suite on why this is a bad idea but I am having trouble coming up with all of the reason ...

How is LastPass sharing secure?

21 hours ago

I'm trying to understand how LastPass can be secure if it allows sharing passwords with users who have not even created accounts yet. Their FAQ says, "When you want to share data with someone else, you pull their public key and use that to encrypt the da ...

CSRF attack on file upload functionality

22 hours ago

Is it possible to perform CSRF attack on file upload functionality? My application upload file by sending multipart/form-data POST request without any random token. Is it possible to prepare HTML form which will demonstrate this attack on application?

DVWA SQLi level: high add user to DB

23 hours ago

I'm attempting to add a new user to the SQL database, however, all that returns is the "something went wrong..." page. Syntax: INSERT INTO users (user_id, first_name, last_name, user, password) VALUES (5, 'first', 'last', 'test', '6280cf58b109e8a6728
705d ...

What can one do to secure holes described by Arnaboldi?

23 hours ago

I have just read: https://www.blackhat.com/
docs/eu-17/materials/eu-1
7-Arnaboldi-Exposing-Hidd
en-Exploitable-Behaviors-
In-Programming-Languages-
Using-Differential-Fuzzin
g-wp.pdf Which describes some security flaws in (amongst others) PHP. What can I do to ...

Tools or recipe usable by a non-professional to check their Wifi security for common issues?

23 hours ago

For many years I've been careful on Wifi. I haven't know how to secure it properly, so it stayed on an isolated NIC of a good router with normal WPA2-PSK and full WAN access but no LAN access at all, and all was safe. I'm moving to allow some WiFi, at le ...

How to check thrid party jar(JRecord) has any security issues

1 day ago

We are in the process of using third party jar which is not available in Maven Repo. Manually need to be downloaded for usage.Is there any tool or way to find if the JAR has security issues? http://jrecord.s
ourceforge.net/JRecord04.
html is the website fr ...

How to check if a third party jar(JRecord) has any security issues

1 day ago

We are in the process of using a third party jar which is not available in Maven Repo. It needs to be manually downloaded for usage. Is there any tool or way to find if the JAR has security issues? http://jrecord.s
ourceforge.net/JRecord04.
html is the w ...

Is this cross-domain, auto-login OAuth2 SSO design correct, simple and secure?

1 day ago

I need to implement a cross-domain SSO solution. Let's assume I have a-site.com, b-site.com and sso-site.com. The requirements are as follows: Unlogged user clicking "Login" on a-site.com is shown a login screen hosted on sso-site.com. If the user logge ...

Is it possible to predict python's random.random() numbers

1 day ago

I am interested in understanding if it is possible to predict python3 random.random() when seeded with high entropy value from a physical system, like a dice toss. In other words, does random.random is a good function that takes "entropy" and reduces it ...

Is it possible to predict python's random.random() numbers that are constantly seeded with new high entropy real random seed

1 day ago

I am interested in understanding if it is possible to predict python3 random.random() when seeded with high entropy value from a physical system, like a dice toss. In other words, does random.random is a good function that takes "entropy" and reduces it ...

Is it possible to predict Python's random.random() if it is constantly seeded with high entropy values?

1 day ago

I am interested in understanding if it is possible to predict Python 3 random.random() when seeded with high entropy value from a physical system, like a dice toss. In other words, is random.random() a good function that takes "entropy" and reduces it to ...

Rootkit identification?

1 day ago

I'm a PC geek who knows lot of technical stuff, but when a friend of mine was victim of this malware which stole his data as well as some money & I was asked to try to remove it by him an year ago, my findings, in his task manager, if viewed properties of ...

How do I interpret this? [on hold]

1 day ago

Please help me interpret this Dynamic Features of VirusShare Executables Data Set from UCI ML Repository. I am posting a snippet of the dataset. 0.684210526316 8:3 15:20 19:27 22:21 24:4 34:9 36:1 49:3 50:3 61:1 67:9 71:39 80:2 83:13 84:21 87:3 100:3 ...

Appropriate treatment to ip address Web Server

1 day ago

Im new from management and security servers, and i have a doubt on that time: My enviroment is Apache Web Server, and i have some virtualhosts, site1.com and site2.com. What better approach or what i do with requests by ip address? What is a better res ...

Handling requests to server's IP address [migrated]

1 day ago

I have an Apache Web Server running some virtual hosts, site1.com and site2.com. What do I do with requests to the server's IP address? Is it safe to allow requests by IP or do I need block, redirect or what? Looking my error.log I see: [Tue Dec 12 12 ...

How can application like Whatsdog detect user online status from Whatsapp?

1 day ago

Whatsdog detects whether your victim is online or not. What are they doing in background? We know that whatsapp does not provide any api or sdk for this, so how can anyone monitor this type of sensitive activity? NOTE: I am an android developer and want ...

How the system may do not have a constant key but can have constant access

1 day ago

We need to implement an authentication for users from one system to another. We were using OAuth (user enters username/password and system get temporary Access Key and constant Refresh Key to refresh Access Key) before, but now we decide to improve securi ...

How can a system grant constant access without using a constant key?

1 day ago

We need to implement an authentication for users from one system to another. Previously we were using OAuth (user enters username/password and system get a temporary access key and a constant refresh key to refresh the access key), but now we have decided ...

Is it more secure to close port 80 and leave port 443 open

1 day ago

I believe that this question is not duplicate of the following question. This is because the answer provided to that question only focus on user experience, while my question focus purely on security. Scenario: I am running a small website, which is only ...

How great is the risk in publicly sharing part of a private key?

1 day ago

If two people want to check they have the same (say 256 bit) private key, how great is the risk in sharing the first say 8 chars over a potentially public channel? Can an attacker recover any more information than just those characters, and/or how much f ...

PCI - store card details offline

1 day ago

I work for a company that sends out mail/telephone order goods. Some customers have orders they receive every day, with different amounts. We have been asked a few times by various customers if we can store there card details, for processing later, citin ...

An ad frame appeard on my deskop

1 day ago

I was working with my pc and this ad appeared on the corner I've never seen such window before. I've Windows 10 Fall Creators Update version 1709, build 16299.64 I suspected it came from Telegram, closed it, but the ad still remained. It wasn't either ...

Ad window popping up on Windows 10. Am I infected?

1 day ago

I was working with my PC (Windows 10 Fall Creators Update version 1709, build 16299.64) and this ad appeared in the corner: I've never seen such a window before. I suspected it came from Telegram, closed it, but the ad still remained. It wasn't from th ...

How to insert vulnerabity in hidden html input fields using accesskey?

1 day ago

How to insert vulnerability XSS in hidden HTML input fields using accesskey attribute, Note: with script I know it works, I am checking for other ways. So I know below works: alert('0');&quo
t; /> And I found below article : http://blog.portswigger.n
et/ ...

How to perform XSS in hidden HTML input fields using accesskey?

1 day ago

I am trying to insert a XSS payload into a hidden HTML input field. I know it works with a script tag like below, but I am looking for other alternatives. alert('0');&quo
t; /> I found this article, that says it can be done with the accesskey attribute: ...

CSR private key location in Windows 2003 and Windows 2008

1 day ago

Where is the CSR private key in Windows 2003 and Windows 2008? I need to make backup of it.

Is system reserved partition a security threat?

1 day ago

Since it's hidden partition & generally inaccessible to end-user unless one boots from Ubuntu/ other OS, but malware can access it I think, AFAIK system reserved partition stores BCD, & other boot configurations, WinRe files, as well as bitlocker settings ...

snort and pcap logs

1 day ago

I wanted a mechanism in snort please let me know , how I can differentiate logs output (alert)file or any logging format can be output, I want to filter or dump the logs based on [priority : 1] or classtype , where I can understand by seeing logfile name ...

How to Change a Culture of "Security Through Obscurity"

1 day ago

I have worked for a number of organizations in the past that utilize practices that are justified by what I would describe as "Security through Obscurity" including the following: Weak/Vulnerab
le two way hashing of passwords Utilizing various API's/Util ...

Efficient Way to Brute Force With Large Wordlist

1 day ago

I am considering attempting to perform an SSH brute force attack on my own device in order to test its security, but I have run into an issue with the wordlist. I know my own password format, as well as that of a few other devices, so I have used Crunch t ...

Checking for sensitive data/code secrets - industry best practices

1 day ago

I know that this doesn't actually fall within the purview of sensitive data exposure, but I can't find a tag that seems relevant to my question. I've been tasked with developing a list of best practices/metrics for detecting and managing sensitive data/s ...

Web Proxy through browser vs through system - is there a difference?

1 day ago

I read that when using a web proxy - your ISP can still see the DNS queries so it knows which site you're visiting, just not which pages and the pages' content assuming you're using HTTPS. But what about using a proxy through a browser? Is that any diffe ...

Security of 3rd party JavaScript libraries for RSA and ECDSA key generation

1 day ago

Not being an expert in security I am Wondering if it is secure to use forge, secp256k1-node, or elliptic node modules to generate asymmetric keys. I am thinking of that recent OpenSSL bug that came up and am wondering if these libraries are subject to tha ...

To what extent can the latest iPhones be trusted?

1 day ago

What features risk information leakage and how secure is the ecosystem overall? What are some of the most recent exploits?

To what extent can the latest iOS be trusted?

1 day ago

What features risk information leakage and how secure is the ecosystem overall? What are some of the most recent exploits?

Prevent OSSEC from triggering alert when using phpMyAdmin

1 day ago

I have OSSEC 2.9.2 running on CentOS 7 with phpMyAdmin 4.4.15.10. Certain standard functions of phpMyAdmin are triggering rule id 31106, A web attack returned code 200 (success). which in turn is a child of 31103, 31104, 31105 in the web_rules.xml ...

Are Texted 2FA Security Codes Deliberately Easy to Remember?

1 day ago

I have 2FA setup on my bank account. When I login, I receive a six-digit code as an IM on my phone that I enter into the website. These codes always seem to have a pattern to them. Either something like 111xxx, 123321, xx1212, etc. I'm thinking that thes ...

Anti Virus x Firewall with Antivirus

1 day ago

I would like to know from Information security respect , is Antivirus SW is needed to be a sperate that FireWall ? In my company they have Firewall Palo Alto FireWall and they mention that it is as Firewall and AntiVirus . It that is acceptable in Inform ...

Antivirus vs Firewall with Antivirus

1 day ago

I would like to know from an information security respect, is antivirus software needed to be separate from the firewall? In my company, they have a Palo Alto firewall and they mention that it is a firewall and antivirus. Is that is acceptable in informa ...

How to get vulnerabilites by product name and version

1 day ago

I have a list of software installed on workstations which contains product name and version, for example my list contains Mysql Workbench 6.3.8. Searching in CVE Details I found out that this software has one vulnerability CVE-2017-3469. Is there any auto ...

how to create a wrapper for an executable file

1 day ago

What I want to do is to modify the behavior of a binary file ( but I don't have sourcecode of this file). One solution I can think about is to create a wrapper, and this wrapper can defer some API calls or add additional API calls. Do you know is there an ...

Unexplained bug with ROP exploitation

1 day ago

I currently am trying to exploit an example program with a return-to-libc exploit. The program is this one : #include #include /* gcc -fno-stack-protector -o lab5C lab5C.c */ char global_str[128]; /* reads a string, copies it to a global */ void cop ...

What is wrong with these two words? [on hold]

1 day ago

I set to write an article on Fiverr and the text alerted me. For many words in the article, the corrector marked it as wrong, but if I write the same words the corrector does not mark it as wrong. My question is: Is it a virus? Can be it intentional? r ...

Help me to be safe

2 days ago

I have been secretly wearing mybmoms clothes and a friends, when iwear them I get so excited I wet myself and soil at the same time... It has now become to where I can't control it at all.. I want and need diapers how do I ask my mother to buy for me? And ...

Aren't the current implementations for multi-factor authentication heavily dependent on a single point of failure?

2 days ago

A lot of 2-factor authentication methods seem to rely on either a text message, email or a one-time password like Google's Authenticator as the second step in authentication. It seems like these methods all rely on the security of a user's phone. For ex ...

Unexplored/Ongoing challenges in Malware Classification?

2 days ago

I wish to use the UCI ML Repository's Dynamic Features of VirusShare Executables Data Set to do a three month project? Can someone please suggest me any unexplored topic in malware classification on which I may be able to write a paper as well due to the ...

EPS (Event Per Seconds) and event aggregation in SIEM

2 days ago

I would like to know the SIEM (Security Information and Event Management) systems calculate the Event per Seconds ration ? My guess is that, the SIEM parses each log line and groups the log records which tell similar events, but I can't come up with an e ...

EPS (Event Per Second) and event aggregation in SIEM

2 days ago

I would like to know how SIEM (Security Information and Event Management) systems calculate the Event per Second ratio. My guess is: the SIEM parses each log line and groups the log records which tell similar events, but I can't come up with an exact for ...

Realtime Database for China

2 days ago

As we know, most of Google Cloud, APIs, websites and services are not accessible in China? So if I am making an app which is using Firebase as its mobile backend, then what equivalent should I consider for China?

Why allow HTTPS but not SSH?

2 days ago

I few companies I've worked for have allowed HTTPS, but not SSH. Why would HTTPS be considered safe, but SSH not be?

Can someone be tracked using a VPN?

2 days ago

Let us assume that someone sends me a threatening message on Facebook. I also want to assume that they have used a VPN to do so, given the location I got from an initial trace is looked into and is false. How can I trace their location? Can facebook do it ...

vulnerabilitate

2 days ago

why it says the parameter is not vulnerable although owasp found it vulnerable here https://www.com/user
s/login-fast.php?looking_
for=Worker%27+AND+%271%27
%3D%271%27+--+ Worker 'AND' 1 '=' 1 '- and the parameter is look_for and the error is how to explain ...

Is it possible to sniff MAC addresses from a client that is not connected to an AP?

2 days ago

A similar question was answered here for sniffing MAC addresses from clients connected to 802.11 wireless access points. My question is, is it possible to sniff MAC addresses from clients which are currently not connected an access point? For example, doe ...

How to edit a Hex code without corrupting the file [in bypassing av]?

2 days ago

I recently started studying on bypassing AV by finding a AV signature on "nc.exe (NetCat)" and changing it to see how it works. I have already found the place of signature with splitting method then i should open the ne.exe with a hex editor and change th ...

SSL/TLS - Does the client select symmetric key for data encryption?

2 days ago

After reading the excellent answers here and documents about how SSL works. I have a doubt about what the function of the ClientKeyExchange step is. In the above linked answer and document it says that the client part of the key is sent encrypted via the ...

Shutdown vs sleep

2 days ago

From a security point of view, is sleep safer than shut down in laptops? Shutdown only needs to be done after monthly updates, since shutdown "saves" settings, "changes" etc, then reboots. Sleep only saves session & then enters low-state mode.

Modeling for security analysis

2 days ago

I am doing a PhD in design for cybersecurity / safety domain and I am having troubles to put the correct words on an idea I had. Given some threats against a system, let's assume we have identified the components / functions which are most likely going t ...

Nmap default scan technique

2 days ago

I'm a little bit confused about what is the default scan option for an nmap scan. For example: nmap -A -p 22 Am I performing a SYN scan or TCP connect scan?

Storing encrypted information

2 days ago

I've posted this same question to stack overflow, but haven't gotten any full answers yet; it may be a better fit for here. I'm currently working on an android app that is a simple photo viewer. I'm having trouble finding out how best to store the encryp ...

Tools for encrypting packets

2 days ago

we are working on network security. Is there any tool for encrypting the packets using the algorithm developed or any other way to implement secure transfer of packets using the algorithm developed?

Where or how can I get list of domain dependencies of top 100 popular sites?

2 days ago

For example google.com depends on ssl.gstatic.com, lh3.googleusercontent.com
, fonts.gstatic.com. I need this list for Proxy settings

Changes in security measures after gaining objectively big social following in a short time period?

2 days ago

Say you have 2-step authentications with strong and different passwords and a different email for each account and say your following goes from 1k to 500k people for example in a short period of time. Do you just roll on as before in respect to your accou ...

Is representing each word as a number secure?

2 days ago

Someone is trying to send me 500,000 documents each containing 1 or 2 sentences. They run a script that scans the whole set of documents and assigns a number to each word (splits on whitespace). I need to run a script on the documents that requires that ...