Questions tagged [international]
31 questions
3
votes
3 answers
Will my company’s VPN work internationally, and will it alert them or display as a security threat?
I work remotely and have to go to Europe for a few weeks in order to deal with a family emergency. I don’t want to explain the situation to my company and I know it won’t affect my work productivity. Will I be able to log into the network/VPN from…
Walter0326
- 31
- 1
- 1
- 2
3
votes
3 answers
Making transactions only, or almost only, by QR codes
I have a OnePlus 6 smartphone and I recently opened a bank account in a bank which seems to me very innovative in the context going payment card (debit/credit) free (using only application and/or cash).
It will not necessarily be my main bank…
user123574
3
votes
4 answers
What actions should be taken by site according to Data Protection legislations?
Many countries have data protection legislation:
Data Protection Directive in EU
Data Protection Act 1998 in UK
privacy laws in USA
Web application may have registration form where fields for name, surname, email address, address, phone number…
Andrei Botalov
- 5,267
- 10
- 45
- 73
3
votes
2 answers
Is Apple’s latest encryption considered to be munitions grade?
According to U.S. Export and Import laws, any device that has a minimum level of encryption is considered as falling under munitions type laws.
Does Apple’s latest OS contain that level? And if it does, has anyone been questioned or convicted of…
Steve Shepard
- 31
- 1
2
votes
2 answers
Corporate Domain-Joined PC Used in China
What would be the disadvantages of allowing a user to travel to China (business trip) using a domain-joined corporate Windows PC as opposed to a non-domain-joined PC?
SecureTrip
- 21
- 1
2
votes
1 answer
Protecting myself in Ukraine
I am a United States citizen planning a week-long trip to Ukraine. A friend advised me that Internet security is less-than-great there. What steps should I take to protect myself if I use public or hotel wifi connections for my smart phone and…
thumbtackthief
- 687
- 2
- 7
- 11
1
vote
0 answers
Let users sign in with eIDs - do I need government authorisation? (scope: all nation-states)
I've decided to launch a crypto-basic income system.
Crypto UBIs are pretty popular now.
For me, it seems like an open nation-state ID should exist by now (2015). However, Mike Hearn, Bitcoin core-developer and a long time software engineer,…
J. Doe
- 19
- 2
1
vote
0 answers
Making custom wordlists for languages besides English
I'm testing a site whose audience doesn't usually have English as their main language. When it comes to non-English, I consider there to be 3 groups
The target language's alphabet is a subset of the English alphabet
This is easy. Just use…
ChocolateOverflow
- 3,452
- 4
- 17
- 34
1
vote
1 answer
What regulations *require* multi-factor authentication?
What industries require multi-factor authentication?
Please include the following information:
Country
Industry
Regulation name
Additional information as you see relevant.
Some additional information I'd like to know is how the regulation…
makerofthings7
- 50,090
- 54
- 250
- 536
0
votes
1 answer
What are the security features of the proposed "secure email" from Brazil?
Brazil has announced that they will create a secure email alternative in light of NSA spy programs. The company Correios will be implementing the contract over the next year or so.
What are the security features that will be included in this email…
makerofthings7
- 50,090
- 54
- 250
- 536
0
votes
0 answers
What strategies can I use to negotiate security terms in vendor contracts for vendors in high geopolitical risk countries?
Please assume the following in responding:
Data being passed to vendor is subject to data protection laws in the USA such as GLBA
Data itself resides within the United States
Switching vendors will be difficult due to tight integration with…
Anthony
- 1,736
- 1
- 12
- 22
0
votes
1 answer
How plausible are cyber attack attributions between states?
When an attack on IT systems of a state is discovered, often another state is publicly blamed for it within a few days. I wonder whether these attributions are plausible from a technical point of view.
How are sophisticaed cyber attacks traced? Is…
黄雨伞
- 101
- 1
0
votes
2 answers
Concern about potential of VPN access being restricted in Italy
Background: I work a remote employee in the US for a US based company. I log into our company's intranet via VPN to work every day. I also connect to multiple client networks via VPN (as well as using TeamViewer, LogMeIn, RPD, etc).
Plan: I want to…
TrailJon
- 111
- 1
-1
votes
1 answer
Wiretapping requests to VPN providers
What are valid issuers of wiretapping requests aimed at VPN providers except the court of the provider's country?
Is it possible that country in which jurisdiction VPN provider does not act will issue a wiretapping request which will cause user…
Pyotr B.
- 3
- 2
-1
votes
2 answers
Precautions to be made while using Internet chat to prevent being hacked?
I have read many websites which state that, "We can hack into computers while chatting on the internet."
What are the best precautions to be taken while chatting to prevent unauthorized access?
I thought one might be to use a firewall, but firewalls…
BlueBerry - Vignesh4303
- 5,107
- 13
- 34
- 63