Questions tagged [identification]

88 questions
2
votes
1 answer

Large lan party : How to identify the users on the network?

I would like to know what are the good way to identify users on a large lan party when you manage network ? I had the idea to make the users register them self at a desk, they give us Firstname, Lastname, MAC address, then we give them an IP linked…
Kedare
  • 129
  • 5
2
votes
1 answer

How WhatsApp identifies a specific user

How does WhatsApp identify a specific user in order to forward the messages to him? Here is what I did: I backed up my iOS App from my old device Restored the backup to the new device Opened WhatsApp on new device And it works without any need for…
1
vote
0 answers

Let users sign in with eIDs - do I need government authorisation? (scope: all nation-states)

I've decided to launch a crypto-basic income system. Crypto UBIs are pretty popular now. For me, it seems like an open nation-state ID should exist by now (2015). However, Mike Hearn, Bitcoin core-developer and a long time software engineer,…
1
vote
1 answer

SSL/TLS entity identification

Does SSL/TLS contain any form of identification in the initial handshake, so an attacker cannot simply waive the certificate around claiming they are someone else? Wikipedia did not say that it did, but I was wondering if the public key on the…
dylan7
  • 737
  • 8
  • 17
1
vote
1 answer

Is there any College, State or Government ID that transmits a offline verifiably encryptable data blob?

I'm looking for any way to digitally verify a user, ideally with a photo and link PII to that user. My use case is that a user will extract and send an encrypted data blob (say from a passport) to my server, and my server will verify it's…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
1
vote
2 answers

How to uniquely identify / tag client devices to whitelist VPN access?

I'm just wondering if there is any way to uniquely identify or tag client devices like laptops and towers in order to whitelist them for vpn access. (Note: This is a thought-experiment at the moment, but I hope I can implement this at some point).…
mohrphium
  • 280
  • 1
  • 3
  • 9
1
vote
1 answer

How can websites fingerprint the company I work for?

During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies were blocked and the company I work for is relatively…
Joe
  • 11
  • 1
1
vote
1 answer

What traces are left on a USB stick after using it?

If one uses a FAT32-formatted USB stick on Windows, Linux, or Android, would there be a way to determine on which computer the USB stick was used by examining the USB stick? I know OS can log which USB sticks were connected. As far as I know, the…
1
vote
1 answer

Guidance on Storing Email Addresses as Hashes

I am building an application where one user (User A) can store a "query" of another user (User B) that may or may not exist in the system. This query can be done by email address. The general workflow is as follows: User A is already authenticated…
Mike-E
  • 165
  • 6
1
vote
1 answer

Understanding ANSI/AAMVA encoded data (pdf417 data matrix) on back of NYS ID card

Background I am developing an Android application for work which runs on a Zebra TC51 bar code scanner, which I have been playing around with.. I scanned my NYS drivers license and inspected the output this morning (sanitized output is below). The…
Chris Maggiulli
  • 113
  • 1
  • 6
1
vote
1 answer

VoIP service requires a scanned copy of my passport

In the process of registering to Callcentric, they asked me a scanned copy of my passport. I already gave them my mobile number, where they could possibly make an interview, and of course they have my IP address, which allows to obtain my identity…
antonio
  • 845
  • 2
  • 8
  • 15
1
vote
1 answer

How can a network admin uniquely identify machines on their network?

My network admin might have a record of my default MAC address tied with some mischievous doings as well as my currently used address that they've likely collected after I started accessing using their controlled logins. I initially thought that…
Joe
  • 21
  • 3
1
vote
1 answer

Logging scarce outbound communication

I have the following predicament. I am tasked with making sure our client's workstations are squeaky clean from a Malware point of view. We have been blessed with Websense as a malicious outbound traffic identifying tool. Let's say for a given host…
user137684
  • 13
  • 2
1
vote
2 answers

How does this site uniquely identify a device?

First try clicking on the blue button here. Then if you have a VPN start it up, open the terminal and curl the same link. In the response, you will see that the button is now disabled. The server identified you as having clicked the link already…
silkAdmin
  • 93
  • 6
1
vote
2 answers

Is there a way to uniquely identify a mobile device through packet sniffing?

I need to uniquely identify a mobile device using the "ping" packets that it transmits to cellular towers regularly, in an area of interest by installing a packet sniffer at that location? I only need to identify the device real time, and not store…
Ashley
  • 11
  • 3