Questions tagged [data-transfer]

for securing sensitive data in motion, or for securing the process and infrastructure for transferring the data.

for securing sensitive data in motion, or for securing the process and infrastructure for transferring the data.

14 questions
22
votes
5 answers

Unidirectional continuous data transfer to an air-gapped computer

What would be a way to transfer files in one direction from internet-facing computerA => air-gapped computerB to protect the files on computerB from unauthorised disclosure, short of using an expensive data-diode? Requirements The data transfer…
light108
  • 329
  • 2
  • 4
7
votes
2 answers

What is the safest and most convenient way to transfer data from my computer to "unknown" USB devices?

I recently attended a friends wedding. As a gift to the couple I filmed lots of things and edited the clips into a montage of the big day. Thankfully they loved it and I have had requests from a number of people who would also like a copy. Due to…
Samir
  • 71
  • 1
2
votes
1 answer

RSA Key, String vs Hex vs Base64 vs byte-array represantational form

....key is normally a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa.... https://www.di-mgt.com.au/cryptokeys.html Suppose I have a Backend server which stores some public keys user submits…
2
votes
1 answer

Encrypting a blob with a password

Is there anything to say against to have an amount of public keys, which encrypt a common password for a blob encrypted? So Users 1,2,3 have all certificates for themselves and can use them to get the master password. With this master password they…
mayen
  • 23
  • 2
1
vote
2 answers

How to securely transfer data from a public website, to a VPN-secured website?

I'm (currently) a VPN newby. I have a VPS with a few websites on it, hosted by liquid web. I have installed a medical records package (openEMR) in a sub-domain, in its own cPanel account. I intend to use the free VPN that liquid web provide, to…
1
vote
2 answers

Is it more blessed to send than retrieve emails? Mandatory-TLS transmission vs IMAP over SSL retrieval

A client (another company) wants us to send them info via email regularly (hundreds of emails a day). They requested emails because each email will create a separate ticket in their task management system. The emails contain private information. We…
browly
  • 2,100
  • 2
  • 12
  • 21
1
vote
1 answer

Secure data transfer to internal network

I need to transfer data originally from the internet that is first transported to a DMZ, then from the DMZ into an internal network. The data is basically real-time data that is needed on the internal network for further testing, nothing…
Castr3l
  • 11
  • 3
0
votes
1 answer

Securely transfer a file to a server via PHP

I'm trying to extract a specific dataset via a daily cronjob written in PHP (by extracting the data from a MariaDB DB), and transfer it onto another server D which is externally available to a client. The approach I'm using is: A) Extract data from…
DevelJoe
  • 115
  • 4
0
votes
1 answer

Upload Private Key into Web App

I am developing a web application that is integrating with a third-party that does not have OAuth capability, but instead use a variety of account IDs and keys to generate tokens for API calls. On the Front End, we have created a text field to paste…
Sinker
  • 103
  • 2
0
votes
1 answer

On Gmail I received an Incoming TLS Encrypted Message. Will my reply be encrypted by default to different email provider?

If I receive an incoming TLS encrypted message from another email provider like outlook/hotmail, will my reply in transit from gmail to outlook/hotmail be encrypted by default as well?
LiTec3
  • 1
0
votes
1 answer

How to securely transfer cookies between two domains?

Let's say you have a website https://example.org which is being decommissioned and redirected to https://example.net. Your users have a cookie on https://example.org which contains some authentication token for the backend services (e.g.…
0
votes
2 answers

How can I double check security against a TLS on a public IP?

Dilemma We are setting up a docker registry server for our company as per these official indications: https://docs.docker.com/registry/deploying/#run-an-externally-accessible-registry. We are evaluation what option to implement: More secure, less…
Xavi Montero
  • 123
  • 4
0
votes
2 answers

Secure algorithm for transferring data between users via QR Code

I'm building a mobile application that transfers points between users via QRCode. I'm concerned about security and am looking for effective simple yes secure algorithm to use. The scenario should be something similar to this. User A wants to…
Abozanona
  • 103
  • 5
-1
votes
2 answers

Is there a way to safely exchange two different digital assets like a revolving door?

In real life it would be like putting two items at the opposite sides of a revolving door, you turn it and they can be exchanged safely. Not only that, if the door is made out of glass, you can pretty much guess that the other person either has the…
gurghet
  • 129
  • 5