-
### Requirements
- [X] Is this a feature request? For questions or discussions use https://lemmy.ml/c/lemmy_support
- [X] Did you check to see if this issue already exists?
- [X] Is this only a featu…
-
Commonwealth Health Physician Network-Cardiology, also known as Great Valley Cardiology (GVC), has notified 181,764 patients of a network breach that resulted in access to protected health informati…
-
### Description:
The objective of this issue is to design and develop a login page that caters to both administrators and regular users within the existing open-source project. Currently, the project…
-
## Description
Using a more significant cost factor significantly increases the compute required to brute-force the passwords from the keys. It is recommended to use a cost factor of more than (or eq…
-
"Deriving key..." predates "Reading keyfiles...". Why? What is used to derive keys if the keyfiles have not yet been read?
Expected behavior: key derivation occurs after obtaining the hash of the key…
-
This issue describes my current understanding of PBKDF2 and the security model of StatiCrypt, and why a concern about the PBKDF2 iteration count in StatiCrypt [was raised](https://github.com/robinmois…
-
Like privnote, the sender can set a password
-
### Problem Statement
Passwords stored in dotCMS are hashed multiple times using an industry recognized algo `PBKDF2-HMAC-SHA256`. When we implemented password hashing, 20,000 iterations were enough…
-
# 每日安全资讯(2023-06-06)
- SecWiki News
- [ ] [SecWiki News 2023-06-05 Review](http://www.sec-wiki.com/?2023-06-05)
- HackerOne Hacker Activity
- [ ] [DOS via cache poisoning on [developer.mozilla.or…
-
Currently, there are no restrictions on complexity for user passwords. Enforce a password policy on the frontend.