Questions tagged [synchronization]

27 questions
1
vote
1 answer

Secure File Replication between LAN and DMZ

Our support staff established remote access connection from jumphosts that are isolated within a DMZ. To provide support they need project files (up to a few GB of size) which are stored on a file server within our LAN. Currently, the transfer is…
gumlozol
  • 21
  • 2
1
vote
1 answer

Can my open Firefox Sync session be used to circumvent a Master Password?

In short I'm wondering what's stopping someone with access to my computer account to exploit an open Firefox Sync session to view my synced passwords, even if a Master Password has been set. On this page Mozilla says: Even though the Password…
Andreas
  • 111
  • 1
  • 7
1
vote
0 answers

Securely Synchronize Nodes

There's an application that is capable of spinning up nodes for HA. All nodes need to be synchronized with a configuration file that contains the credentials of all the admins. The current solution is through a RESTful GET request to pull the config…
ismisepaul
  • 123
  • 3
1
vote
1 answer

How is resynchronization performed for security keys / MFA devices?

When a MFA (time based) device security key drifts out of synchronization there is a procedure to resynchronize it. But there is no input to the device itself. Smartphone apps don't have this problem. I assume this is because the app has access to…
Skaperen
  • 315
  • 2
  • 11
1
vote
1 answer

How to synchronize a nonce between two participants?

I am currently working with a symmetric algorithm which requires a nonce for encryption, and logically for decryption as well. However, I am a bit confused about how I would go and synchronize the nonce on both clients. Let's say my nonce is…
1
vote
0 answers

Encrypt and backup files directly to cloud storage? (No locally saved copies)

So far I know of the following services: Tresorit (paid cloud storage service) SpiderOak (paid cloud storage service) Arq (paid software, works with a number of cloud services) ...are there any others? Specifically, I am talking about Type 1…
1
vote
1 answer

How can you spoof a TCP connection to a device that uses the same initial sequence number for each run of a TCP handshake?

So supposing the TCP implementation on a device always uses the same initial sequence number how could you as an off path attacker exploit this to spoof a connection to this device? So in order to do this you would need the device to set up a TCP…
ellefc
  • 499
  • 2
  • 6
  • 14
0
votes
1 answer

How do u2f devices manage to not go out of sync?

U2F devices store an internal counter to resolve a challenge and the counter value is sent back to the server (source). I think the counters on the server and on the client must go out of sync from time to time, the internet connection just needs to…
Gamer2015
  • 707
  • 4
  • 12
0
votes
0 answers

Is quarantine threats absolutely necessary? Every time I do, all my Chrome tabs crash

I have been talking backwards and forwards with a MalwareByte support, because every time I run 'quarantine threats' all my Chrome tabs crash. This guy keeps asking me to switch Google sync off, and then resetting it, except that there is no reset…
0
votes
1 answer

Is there a way to check if Google Drive is scanning folders other than the ones I have synced?

I have a piece of software that monitors C:\Folder1. It keeps it in sync with C:\Folder2. It encrypts everything in C:\Folder2. I want to sync Folder2 to my Google Drive. But this additional encryption step is silly if they could scan my entire file…
0
votes
1 answer

What client side encryption algorithm/libraries should I use to make syncing easier?

I want to build a webapp and a sister mobile app (using react native) that uses client side encryption. The encryption would be for text entries written on a daily basis that the user could create and edit. If the user goes offline, I want them to…
Loktopus
  • 165
  • 5
0
votes
2 answers

How effective are timestamps as a countermeasure for Replay attacks?

I was reading the Wiki entry for Replay attacks. It mentions that timestamps can be used as a countermeasure against such attacks: Timestamping is another way of preventing a replay attack. Synchronization should be achieved using a secure…
turnip
  • 785
  • 1
  • 6
  • 9
1
2