Questions tagged [international]

31 questions
3
votes
3 answers

Will my company’s VPN work internationally, and will it alert them or display as a security threat?

I work remotely and have to go to Europe for a few weeks in order to deal with a family emergency. I don’t want to explain the situation to my company and I know it won’t affect my work productivity. Will I be able to log into the network/VPN from…
Walter0326
  • 31
  • 1
  • 1
  • 2
3
votes
3 answers

Making transactions only, or almost only, by QR codes

I have a OnePlus 6 smartphone and I recently opened a bank account in a bank which seems to me very innovative in the context going payment card (debit/credit) free (using only application and/or cash). It will not necessarily be my main bank…
user123574
3
votes
4 answers

What actions should be taken by site according to Data Protection legislations?

Many countries have data protection legislation: Data Protection Directive in EU Data Protection Act 1998 in UK privacy laws in USA Web application may have registration form where fields for name, surname, email address, address, phone number…
Andrei Botalov
  • 5,267
  • 10
  • 45
  • 73
3
votes
2 answers

Is Apple’s latest encryption considered to be munitions grade?

According to U.S. Export and Import laws, any device that has a minimum level of encryption is considered as falling under munitions type laws. Does Apple’s latest OS contain that level? And if it does, has anyone been questioned or convicted of…
2
votes
2 answers

Corporate Domain-Joined PC Used in China

What would be the disadvantages of allowing a user to travel to China (business trip) using a domain-joined corporate Windows PC as opposed to a non-domain-joined PC?
SecureTrip
  • 21
  • 1
2
votes
1 answer

Protecting myself in Ukraine

I am a United States citizen planning a week-long trip to Ukraine. A friend advised me that Internet security is less-than-great there. What steps should I take to protect myself if I use public or hotel wifi connections for my smart phone and…
thumbtackthief
  • 687
  • 2
  • 7
  • 11
1
vote
0 answers

Let users sign in with eIDs - do I need government authorisation? (scope: all nation-states)

I've decided to launch a crypto-basic income system. Crypto UBIs are pretty popular now. For me, it seems like an open nation-state ID should exist by now (2015). However, Mike Hearn, Bitcoin core-developer and a long time software engineer,…
1
vote
0 answers

Making custom wordlists for languages besides English

I'm testing a site whose audience doesn't usually have English as their main language. When it comes to non-English, I consider there to be 3 groups The target language's alphabet is a subset of the English alphabet This is easy. Just use…
1
vote
1 answer

What regulations *require* multi-factor authentication?

What industries require multi-factor authentication? Please include the following information: Country Industry Regulation name Additional information as you see relevant. Some additional information I'd like to know is how the regulation…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
0
votes
1 answer

What are the security features of the proposed "secure email" from Brazil?

Brazil has announced that they will create a secure email alternative in light of NSA spy programs. The company Correios will be implementing the contract over the next year or so. What are the security features that will be included in this email…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
0
votes
0 answers

What strategies can I use to negotiate security terms in vendor contracts for vendors in high geopolitical risk countries?

Please assume the following in responding: Data being passed to vendor is subject to data protection laws in the USA such as GLBA Data itself resides within the United States Switching vendors will be difficult due to tight integration with…
Anthony
  • 1,736
  • 1
  • 12
  • 22
0
votes
1 answer

How plausible are cyber attack attributions between states?

When an attack on IT systems of a state is discovered, often another state is publicly blamed for it within a few days. I wonder whether these attributions are plausible from a technical point of view. How are sophisticaed cyber attacks traced? Is…
黄雨伞
  • 101
  • 1
0
votes
2 answers

Concern about potential of VPN access being restricted in Italy

Background: I work a remote employee in the US for a US based company. I log into our company's intranet via VPN to work every day. I also connect to multiple client networks via VPN (as well as using TeamViewer, LogMeIn, RPD, etc). Plan: I want to…
TrailJon
  • 111
  • 1
-1
votes
1 answer

Wiretapping requests to VPN providers

What are valid issuers of wiretapping requests aimed at VPN providers except the court of the provider's country? Is it possible that country in which jurisdiction VPN provider does not act will issue a wiretapping request which will cause user…
Pyotr B.
  • 3
  • 2
-1
votes
2 answers

Precautions to be made while using Internet chat to prevent being hacked?

I have read many websites which state that, "We can hack into computers while chatting on the internet." What are the best precautions to be taken while chatting to prevent unauthorized access? I thought one might be to use a firewall, but firewalls…
BlueBerry - Vignesh4303
  • 5,107
  • 13
  • 34
  • 63