Skip to main content

Questions tagged [compression]

the act of compression reduces the size of the file(s) being compressed by encoding information and eliminating statistical redundancy.

Filter by
Sorted by
Tagged with
0 votes
2 answers
165 views

The general consensus on enabling SSL Compression is "don't" because of the CRIME exploit. However, this exploit seems to have been mitigated in 2012. I want to know: Should I still avoid ...
Kingsley's user avatar
  • 103
1 vote
1 answer
191 views

Let's assume an API returns sensitive information (e.g. medical or financial) to authenticated users only. In some circumstances responses may include information the user supplied in the request (e.g....
Joseph's user avatar
  • 13
1 vote
2 answers
454 views

I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only ...
ReaLiTy-UnFatHom's user avatar
24 votes
2 answers
6k views

I've had a look within the official TLS specification but I cannot see any mention of this. Does TLS allow compression to be disabled? Or is it mandatory?
intrigued_66's user avatar
0 votes
1 answer
3k views

I'm not an expert of security. I heard it's not recommended to enable GZIP compression for HTTPS requests, that would open a security issue (see SO answer: https://stackoverflow.com/a/4063496/17307650 ...
Zorgatone's user avatar
  • 135
0 votes
1 answer
374 views

lets say I have a rar file that has a bunch of images inside. Is there any risk of opening the image inside the rar without extracting the entire file?
zhili wang's user avatar
5 votes
2 answers
3k views

I'm having a hard time knowing whether the following setup is vulnerable to CRIME/BREACH type attacks (which target HTTPS). I am running a Wireguard VPN that tunnels VXLAN protocol, using ChachaPoly20 ...
Orsiris de Jong's user avatar
3 votes
3 answers
946 views

I want to archive some GB of sensitive data. It is to be stored on an external drive that also includes non sensitive data so i don't want to encrypt the whole drive. For that purpose i want to use ...
WiCloverS18's user avatar
5 votes
3 answers
2k views

Section 5.4 of the TLS 1.3 specification describes record padding. One of the mitigations for BREACH is to add random padding. Therefore, I'm wondering: Does TLS 1.3 require random record padding? I'...
candrews's user avatar
  • 151
3 votes
1 answer
1k views

Learning a bit about IT security, a segment of the material was the basics of steganography - specifically, hiding information in the lowest significance bits of images, and converting images into ...
sisisisi's user avatar
  • 193
1 vote
1 answer
2k views

I lost my winrar password of my file. I need to access it. Is it possible? If yes, how?
Stan.E's user avatar
  • 21
8 votes
1 answer
4k views

A Zip bomb (concept here) seems quite a "smart" and easy vulnerability to websites where uploading ZIP files is allowed. Such sites are under a threat (at least to make some degree of damage to them) -...
T.Todua's user avatar
  • 2,747
0 votes
1 answer
800 views

I know that there are multiple HTTP Compression tools out there. In order to entirely prevent a site from being susceptible to BREACH, which HTTP Compression algorithm should I use? Also, how ...
JohnFF's user avatar
  • 144
-5 votes
3 answers
3k views

I am trying to figure out how to get my source information to compile smaller using encrypted text. This could potentially change the game in transferring large-chunked data and offer security at the ...
DeerSpotter's user avatar
0 votes
2 answers
692 views

First of all I am not very familiar with the world of encryption so please be nice. I have got a data that should store in an xml using NetDataContractSerializer. This xml file gets the size of from ...
KayJay's user avatar
  • 1
15 votes
1 answer
1k views

It was mentioned that JPEG should not be used between image creation and redaction of sensitive contents, because compression artifacts around the redacted area may leak information. Given how this ...
forest's user avatar
  • 67.8k
2 votes
1 answer
122 views

How does an application control whether or not its http content is compressed? I am not talking about TLS level compression, but rather about the compression of https:// response bodies only. In ...
Frugal Guy's user avatar
0 votes
0 answers
105 views

I follow the tutorial here: https://www.youtube.com/watch?v=g0RmclTe7Lo to pack calc.exe in windows 10 at C:\Windows\System32\calc.exe But I get the following error: What's the problem? It seems ...
william007's user avatar
18 votes
8 answers
17k views

Imagine I wish to upload my sensitive personal information (photos, document scans, list of passwords, email backups, credit card information, etc.) on Google Drive (or any other cloud service). I ...
Neli's user avatar
  • 239
11 votes
1 answer
3k views

It appears that Chrome, Firefox, and soon Edge, support the new Brotli compression algorithm over HTTPS only. I can't find anything on whether this new compression algorithm is susceptible to the ...
rink.attendant.6's user avatar
0 votes
2 answers
485 views

Today it was posited to me that sha256 has a domain large enough to never encounter a collision and that because it is such a large domain and given that a reverse function was created for it, that ...
virus.cmd's user avatar
  • 101
1 vote
4 answers
560 views

These days we observes trend to use HTTP over TLS (HTTPS) for all communication. It recommend all weighty Internet service vendors and that claims to good practice. But TLS suite have 3 options for ...
slonma's user avatar
  • 11
1 vote
0 answers
298 views

The changelog for RAR 5 mentions the following: Features removed: authenticity verification feature did not provide the required level of reliability and was removed; ... I didn't find any ...
Paul's user avatar
  • 633
0 votes
1 answer
3k views

I have this string encoded and compressed (link to full string) ...
matiq's user avatar
  • 3
8 votes
3 answers
4k views

File compression utilities like Winrar or ZIP or 7zip encrypt the password and store it inside the archive. How safe is that? I mean you are giving away the archive with the password inside,it's not ...
microwth's user avatar
  • 2,473