Is it safe to encrypt company text files with MD5 hash?
Hypothetically, would it be safe to encrypt company text only files with the less secure MD5 hash, if the files are all stored locally on local servers with their own security measures?
Hypothetically, would it be safe to encrypt company text only files with the less secure MD5 hash, if the files are all stored locally on local servers with their own security measures?
I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it failed, even though I have the the password…
I submit drawings of structures to clients. Sometimes the clients refuse to pay after I submit the drawings. Is there a way in which I can obscure parts of a PDF of the drawings and protect it using a password? After the client pays, I wil…
I don’t remember my passphrase for my PGP key that was created several years ago.
How can I decrypt my file.key to recover it?
Or what should I do to recover it from my file.key?
I have been looking around at various encryption schemes, and I haven’t found anything exactly like what I want in terms of user experience.
If what I want isn’t a thing, I assume it’s been thought of, but other approaches won out. So can …
I have some sensitive stuff and stuff I don’t want people parsing(?) by downloading the file even tho it’s password protected. I just can’t rearchive it, it’s a huge file and took almost to a dozen hours.
Our device comes with a device certificate which was signed with our private registration authority (CA). The private key (type ECC) was generated on the device itself – to be more specific directly on the on-board TPM. The public key is i…
I would like to set up a per-file encryption architecture where every file is encrypted with its own key, and each key is encrypted using a master key.
Is there any good articles to read regarding this? Or any advice?
The questions I have …
As the title implies, I would like to design a secure file storage/sharing platform. This is an abstract design question, so details regarding programing languages or platforms are not particularly relevant, unless they represent the only …
Does Wire employ encryption of data at rest?
I generally consider Signal and Wire to be the best tools today for sending information privately between two parties. Both meet the marks on crypto, open-source, 3rd party audits, PFS via the d…